<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Guardian Project Blog on Guardian Project</title>
    <link>https://guardianproject.info/blog/</link>
    <description>Recent content in Guardian Project Blog on Guardian Project</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="https://guardianproject.info/blog/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>DiVine Supports Proofmode</title>
      <link>https://guardianproject.info/2025/12/01/divine-supports-proofmode/</link>
      <pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/12/01/divine-supports-proofmode/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/divine-proofmode&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;If you haven&amp;rsquo;t heard the news that Vine is back, relaunched as DiVine by Evan &amp;ldquo;Rabble&amp;rdquo; Henshaw-Plath, with support from Jack Dorsey. As part of the launch news, they have made it clear that AI Creators are not welcome, and that they want to &amp;ldquo;raise the bar for authenticity&amp;rdquo;.&lt;/p&gt;&#xA;&lt;p&gt;To build this citadel of authenticity, DiVine is relying on Proofmode&amp;rsquo;s free and open-source technology. You can learn more how they have implemented it in the DiVine app and service the DiVine Proofmode page, or read on below.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BASELINE: Native American Heritage Month</title>
      <link>https://guardianproject.info/2025/11/15/baseline-native-american-heritage-month/</link>
      <pubDate>Sat, 15 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/11/15/baseline-native-american-heritage-month/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/nativeamericaheritage&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;To honor Native American Heritage Month, we traveled through Oklahoma, home to 39 federally recognized Tribal Nations, each with its own distinct culture, history, and deeply rooted traditions. Our visit included stops at the First Americans Museum, the National Cowboy &amp;amp; Western Heritage Museum, and the Sam Noble Museum, where we explored extensive collections of Native art, jewelry, pottery, clothing, and everyday items that reflect generations of creativity and resilience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Kindness Mode: Help People Connect to Tor on World Kindness Day</title>
      <link>https://guardianproject.info/2025/11/13/kindness-mode-help-people-connect-to-tor-on-world-kindness-day/</link>
      <pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/11/13/kindness-mode-help-people-connect-to-tor-on-world-kindness-day/</guid>
      <description>&lt;p&gt;Today is &lt;a href=&#34;https://en.wikipedia.org/wiki/World_Kindness_Day&#34;&gt;World Kindness Day&lt;/a&gt;. As stated on Wikipedia, &amp;ldquo;World Kindness Day is to highlight good deeds in the community focusing on the positive power and the common thread of kindness for good which binds us.&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/World_Kindness_Day&#34;&gt;&lt;img src=&#34;worldkindnessday.png&#34; width=200/&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Now that word &lt;strong&gt;bind&lt;/strong&gt; is particularly meaningful to use in a technical way - when a remote computer connects to another computer over a network, whether peer-to-peer or a server, one way to state what happens is &amp;ldquo;binding to their socket port&amp;rdquo;. The decentralized, privacy-focused &lt;a href=&#34;https://torproject.org&#34;&gt;tor network&lt;/a&gt; is powered by volunteer organizations and inviduals around the world sharing their network resources. On Tor, there is a great deal of positive, community &amp;ldquo;good which binds us&amp;rdquo; going on.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BASELINE: Day of the Dead</title>
      <link>https://guardianproject.info/2025/11/03/baseline-day-of-the-dead/</link>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/11/03/baseline-day-of-the-dead/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/day-of-the-dead&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The Day of the Dead (Día de los Muertos) is an ancestral tradition celebrated in Mexico and parts of Central America, where families honor and remember those who have passed away. To help preserve this beautiful cultural heritage, our Baseline initiative teamed up with local communities to document how people celebrate this day, from creating colorful altars (ofrendas) to building memorials that reflect how their loved ones lived and are still remembered.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Join the Hunt @ Global Gathering 2025 in Estoril, Portugal!</title>
      <link>https://guardianproject.info/2025/08/28/join-the-hunt-@-global-gathering-2025-in-estoril-portugal/</link>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/08/28/join-the-hunt-@-global-gathering-2025-in-estoril-portugal/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/thehuntgg2025&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Join the fun to defend reality against fakes by playing &amp;ldquo;The Hunt @ Global Gathering 2025&amp;rdquo;, a multi-day photo and video scavenger hunt held around the Global Gathering 2025 in Estoril, Portugal, in September 2025.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Winners from The Hunt NYC 2025</title>
      <link>https://guardianproject.info/2025/06/20/winners-from-the-hunt-nyc-2025/</link>
      <pubDate>Fri, 20 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/06/20/winners-from-the-hunt-nyc-2025/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/thehuntnyc2025-winners&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Earlier this month, we hosted another installment of our verifiable photo scavenger hunt, as part of the Content Authenticity Summit 2025 in New York City. The exciting twist of this hunt was that instead of just being limited to using Proofmode Capture, any C2PA-verifiable capture app or device could be used.&lt;/p&gt;&#xA;&lt;p&gt;Over the course of the three days, we received variety of excellent submission. In the end, we had three winners who verifiably documented the most items in the most visually compelling way - Mario Pena, Jonathan Venguer, and David Boily!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Join the Hunt NYC at the Content Authenticity Summit 2025</title>
      <link>https://guardianproject.info/2025/06/02/join-the-hunt-nyc-at-the-content-authenticity-summit-2025/</link>
      <pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/06/02/join-the-hunt-nyc-at-the-content-authenticity-summit-2025/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/thehuntnyc&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Join the fun to defend reality against fakes by playing &amp;ldquo;The Hunt NYC&amp;rdquo;, a multi-day photo and video scavenger hunt held around the Content Authenticity Summit in New York City, on June 4th, 2025.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Empowering Mobile Journalism with CuttingRoom and C2PA</title>
      <link>https://guardianproject.info/2025/04/02/empowering-mobile-journalism-with-cuttingroom-and-c2pa/</link>
      <pubDate>Wed, 02 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/04/02/empowering-mobile-journalism-with-cuttingroom-and-c2pa/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/cuttingroom&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CuttingRoom and ProofMode Team Up for Content Authenticity Support on iPhones&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;In today&amp;rsquo;s digital landscape, where increasingly &amp;ldquo;AI Slop&amp;rdquo; runs rampant, the integrity of media has never been more critical. It&amp;rsquo;s a constant battle to discern fact from fiction, and the stakes are high. That&amp;rsquo;s why we&amp;rsquo;re thrilled to announce a partnership that aims to arm journalists and content creators with a powerful weapon in this fight: the integration of the Coalition for Content Provenance and Authentication (C2PA) standard into the CuttingRoom Reporter mobile app for iOS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Generative AI Detection in ProofCheck</title>
      <link>https://guardianproject.info/2025/03/18/generative-ai-detection-in-proofcheck/</link>
      <pubDate>Tue, 18 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/03/18/generative-ai-detection-in-proofcheck/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/proofcheckai&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;ProofCheck is our free and open-source, multi-purpose &amp;ldquo;Swiss Army Knife&amp;rdquo; tool for image, video, and audio metadata inspection. It can work with the &amp;ldquo;Proof Pack&amp;rdquo; bundle zip files that are produced by our ProofMode camera app, and it can also inspect any multimedia file you try to throw at it. It will look for metadata formats like EXIF, C2PA, IPTC, and more, and validate ProofMode PGP signatures, OpenTimestamp notarization, and other cryptographic signatures. All of this happens locally in your browser, without any uploads to a server, ensuring privacy of your media and metadata is maintained.&lt;/p&gt;</description>
    </item>
    <item>
      <title>7ASecurity Completes Security Audit of Círculo</title>
      <link>https://guardianproject.info/2025/03/17/7asecurity-completes-security-audit-of-c%C3%ADrculo/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/03/17/7asecurity-completes-security-audit-of-c%C3%ADrculo/</guid>
      <description>&lt;p&gt;Over the last six months, we’ve been working with &lt;a href=&#34;https://7asecurity.com/&#34;&gt;7ASecurity&lt;/a&gt; through support from the &lt;a href=&#34;https://www.opentech.fund/impact/security-safety-audits/&#34;&gt;Open Technology Fund’s Security Safety Audits&lt;/a&gt;, to complete an audit of our &lt;a href=&#34;https://encirculo.org&#34;&gt;Círculo project&lt;/a&gt;.  The public report on that is &lt;a href=&#34;https://www.opentech.fund/security-safety-audits/circulo-security-audit/&#34;&gt;now available&lt;/a&gt;. You can also read the &lt;a href=&#34;https://7asecurity.com/blog/2025/03/circulo-security-audit-by-7asecurity/&#34;&gt;blog post on the audit from 7ASecurity&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;If you don’t know about Circulo, this is a physical check-in safety app we have developed, alongside Article 19’s Mexico City team, for a number of years, focused on providing secure location sharing and urgent notifications within small trusted groups, for people under threat of physical violence. The free and open-source &lt;a href=&#34;https://gitlab.com/circuloapp&#34;&gt;code we have developed&lt;/a&gt; includes iOS and Android mobile apps, as well as server infrastructure, largely based on the &lt;a href=&#34;https://matrix.org/&#34;&gt;Matrix Protocol&lt;/a&gt;, including the mobile software development kits (SDKs), &lt;a href=&#34;https://matrix.org/docs/matrix-concepts/end-to-end-encryption/&#34;&gt;MegaOLM encryption&lt;/a&gt;, and &lt;a href=&#34;https://github.com/element-hq/synapse&#34;&gt;Synapse Server&lt;/a&gt;. You can read about the last round of work we completed on Circulo, including design, development, and community building, in a &lt;a href=&#34;https://guardianproject.info/releases/CirculoFinalReport20232024.pdf&#34;&gt;public report released in November&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ProofMode at RightsCon: Join The Hunt in Taipei!</title>
      <link>https://guardianproject.info/2025/02/20/proofmode-at-rightscon-join-the-hunt-in-taipei/</link>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/02/20/proofmode-at-rightscon-join-the-hunt-in-taipei/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/rightscon2025&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Join the fun to defend reality against AI fakes, by using the ProofMode app to play The Hunt Taipei, a multi-day photo scavenger hunt held during RightsCon 2025 in Taipei, Taiwan from February 24th to the 27th, 2025.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IOCipher 1.0 community reboot</title>
      <link>https://guardianproject.info/2025/02/01/iocipher-1.0-community-reboot/</link>
      <pubDate>Sat, 01 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/02/01/iocipher-1.0-community-reboot/</guid>
      <description>&lt;h2 id=&#34;iocipher-update-to-version-10&#34;&gt;IOCipher update to version 1.0&lt;/h2&gt;&#xA;&lt;p&gt;We are thrilled to announce that a community contributor has picked up maintaining a fork of IOCipher and updated to IOCipher 1.0,&#xA;designed to enhance your development experience and empower you to create more secure applications with ease. Here’s what’s new and why it matters to you:&lt;/p&gt;&#xA;&lt;h3 id=&#34;1-enhanced-features&#34;&gt;1. Enhanced Features&lt;/h3&gt;&#xA;&lt;p&gt;We introduced a few new features. Most notably IOCipher is also available on Desktop Java for Linux and Windows now. (Although not all IOCipher features are fully supported on Windows).&#xA;The latest release even includes some example code for accessing IOCipher VFS using Python.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Splintered Networks, Unbroken Proof</title>
      <link>https://guardianproject.info/2025/01/29/splintered-networks-unbroken-proof/</link>
      <pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/01/29/splintered-networks-unbroken-proof/</guid>
      <description>&lt;p&gt;&lt;em&gt;Reposted from &lt;a href=&#34;https://proofmode.org/blog/splintered-networks&#34;&gt;proofmode.org&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Nathan shares work for capturing and preserving verifiable eyewitness reporting during internet outages and shutdowns, sometimes called &amp;ldquo;Splinternets&amp;rdquo;. This solution builds on our Butter Box and ProofMode projects. ButterBox is a private, local micro-server hotspot, that allows for the secure upload and storage of multimedia evidence, along with other features.&lt;/p&gt;&#xA;&lt;p&gt;We can also provide online and in-person trainings for humanitarian organizations, news organizations, journalists, election monitoring groups, and others.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Look Back at 2024: F-Droid&#39;s Progress and What’s Coming in 2025</title>
      <link>https://guardianproject.info/2025/01/21/a-look-back-at-2024-f-droids-progress-and-whats-coming-in-2025/</link>
      <pubDate>Tue, 21 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/01/21/a-look-back-at-2024-f-droids-progress-and-whats-coming-in-2025/</guid>
      <description>&lt;p&gt;With 2024 now behind us, we wanted to take a moment to reflect on the growth and achievements we accomplished as a community last year, and celebrate the incredible support we received from the FOSS community throughout the journey.&lt;/p&gt;&#xA;&lt;p&gt;This year has been a milestone for us, with significant strides in decentralizing app distribution, expanding the F-Droid ecosystem, and solidifying our infrastructure. All of these advancements were made possible thanks to donations, grants, our volunteers and regular contributors. So thank you again to everyone who helped make 2024 another great year for F-Droid. Now let&amp;rsquo;s take a closer look at what we accomplished.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using TLS ECH from Python</title>
      <link>https://guardianproject.info/2025/01/10/using-tls-ech-from-python/</link>
      <pubDate>Fri, 10 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2025/01/10/using-tls-ech-from-python/</guid>
      <description>&lt;p&gt;At first, the idea of encrypting more of the metadata found inside the initial packet (the &amp;ldquo;ClientHello&amp;rdquo;) of a TLS&#xA;connection may seem simple and obvious, but there are of course reasons that this wasn&amp;rsquo;t done right from the start.&#xA;In this post I will describe the flow of a connection using Encrypted Client Hello (ECH) to protect the metadata fields,&#xA;and present a working code example using a fork of CPython built with DEfO project&amp;rsquo;s OpenSSL fork to connect to&#xA;ECH-enabled HTTPS servers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Seeking Ruby/Jekyll contractors to start ASAP</title>
      <link>https://guardianproject.info/2024/12/06/seeking-ruby/jekyll-contractors-to-start-asap/</link>
      <pubDate>Fri, 06 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/12/06/seeking-ruby/jekyll-contractors-to-start-asap/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Guardian Project is seeking Ruby/Jekyll contractors for mobile/free software and privacy work!&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;We’re looking for self-motivated, free software hackers to work with Guardian Project on privacy and internet freedom for mobile devices. Our work is 100% free software and we have a steady stream of projects that tie into F-Droid, Debian, Android, Fastlane, Mobifree and other exciting projects. We work to support people and communities around the world. This is a flexible, remote position but we also like to work in person when possible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Seeking part-time Grant Administrator</title>
      <link>https://guardianproject.info/2024/08/05/seeking-part-time-grant-administrator/</link>
      <pubDate>Mon, 05 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/08/05/seeking-part-time-grant-administrator/</guid>
      <description>&lt;p&gt;Location: Fully remote (African/European time zone) or Vienna, Austria.&lt;/p&gt;&#xA;&lt;p&gt;Type: Part-time contractor.&lt;/p&gt;&#xA;&lt;h2 id=&#34;about-us&#34;&gt;About us&lt;/h2&gt;&#xA;&lt;p&gt;Guardian Project is a small organization working to make a big impact in data privacy and secure communications. From the average person looking to use the internet and their mobile device more securely, to journalists needing to safely communicate with sources, to activists looking for secure communication channels, Guardian Project creates solutions that focus on privacy so you have true freedom.&lt;/p&gt;</description>
    </item>
    <item>
      <title>First Time Using CalyxOS Review</title>
      <link>https://guardianproject.info/2024/04/03/first-time-using-calyxos-review/</link>
      <pubDate>Wed, 03 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/04/03/first-time-using-calyxos-review/</guid>
      <description>&lt;p&gt;“But how are you planning on using the phone?” he asked me. I paused, a bit confused. “As a replacement for my iPhone. I want to do everything with this phone that I can do with my iPhone, and use it as I normally would.” He took a beat to respond, “Wow, alright. Well let&amp;rsquo;s give it a shot.”&lt;/p&gt;&#xA;&lt;p&gt;I would describe myself as tech-curious, but the reality is I am not your typical CalyxOS user. In fact, I didn´t know CalyxOS existed until recently. I am not a software developer, I can´t write code and until recently, I never worked in tech. But none-the-less I found myself needing a replacement for my iPhone and asked HC if they could help me out.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF119 Conference Report: Monday March 18, 2024</title>
      <link>https://guardianproject.info/2024/03/18/ietf119-conference-report-monday-march-18-2024/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/03/18/ietf119-conference-report-monday-march-18-2024/</guid>
      <description>&lt;p&gt;&lt;em&gt;It&amp;rsquo;s Opening Day of the &lt;a href=&#34;https://www.ietf.org/how/meetings/119/&#34;&gt;119th IETF meeting&lt;/a&gt; in Brisbane Australia.  This post commences a daily rundown of privacy and Internet Freedom activities at this IETF meeting. For the rundown on IETF119 Hackathon, see my &lt;a href=&#34;https://guardianproject.info/2024/03/17/ietf119-hackathon-report/&#34;&gt;Hackathon report&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;dispatch&#34;&gt;Dispatch&lt;/h2&gt;&#xA;&lt;p&gt;IETF meetings don&amp;rsquo;t often kick off with the open dispatch but this time it happened. Dispatch sessions are meant to help specification authors find a home for their work if a home isn&amp;rsquo;t obvious. There are two classes of dispatch request:&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF119 Conference Report: Hackathon March 17, 2024</title>
      <link>https://guardianproject.info/2024/03/17/ietf119-conference-report-hackathon-march-17-2024/</link>
      <pubDate>Sun, 17 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/03/17/ietf119-conference-report-hackathon-march-17-2024/</guid>
      <description>&lt;p&gt;&lt;em&gt;Hackathon Weekend at the &lt;a href=&#34;https://www.ietf.org/how/meetings/119/&#34;&gt;119th IETF meeting&lt;/a&gt; in Brisbane Australia.  This post commences a daily rundown of privacy and Internet Freedom activities at this IETF meeting.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;IETF&amp;rsquo;s Hackathon, held at each face-to-face IETF meeting, is designed to encourage interoperability testing of standards under development. See this meeting&amp;rsquo;s wiki page for a description of&lt;a href=&#34;https://wiki.ietf.org/en/meeting/119/hackathon&#34;&gt;this year&amp;rsquo;s twenty-four projects&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-httpbis-unprompted-auth/&#34;&gt;The HTTP Signature Authentication Scheme&lt;/a&gt; has been winding its way through the &lt;a href=&#34;https://datatracker.ietf.org/wg/httpbis/charter/&#34;&gt;HTTPbis Working Group&lt;/a&gt; since being adopted as a Working Group draft in July 2022. This work proposes a mechanism by which HTTP servers can offer authenticated resources without telegraphing they do so (thus resisting probing attacks).&lt;/p&gt;</description>
    </item>
    <item>
      <title>The future of our fdroid-compatible app repository</title>
      <link>https://guardianproject.info/2024/02/24/the-future-of-our-fdroid-compatible-app-repository/</link>
      <pubDate>Sat, 24 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2024/02/24/the-future-of-our-fdroid-compatible-app-repository/</guid>
      <description>&lt;p&gt;Guardian Project has been running its own &lt;a href=&#34;https://guardianproject.info/fdroid/&#34;&gt;fdroid-compatible app repository&lt;/a&gt; since &lt;a href=&#34;https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository-out-of-date/&#34;&gt;2012&lt;/a&gt;. Up until now, we worked to ensure that our repository had the same standards of free software as the official F-Droid repository.  Therefore, the Guardian Project repository was included in the official F-Droid client app by default.  A lot has changed since then, for the better.  F-Droid has long since stopped shipping pre-built binaries from any provider.  Back in the day, F-Droid shipped some binaries, like Mozilla&amp;rsquo;s Firefox APKs, and allowed some non-free libraries in apps.  The free software ecosystem on Android has since blossomed, so F-Droid no longer needs to make those kinds of compromises.  And F-Droid is completing a big update on how repositories are handled.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quick set up guide for Encrypted Client Hello (ECH)</title>
      <link>https://guardianproject.info/2023/11/10/quick-set-up-guide-for-encrypted-client-hello-ech/</link>
      <pubDate>Fri, 10 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/11/10/quick-set-up-guide-for-encrypted-client-hello-ech/</guid>
      <description>&lt;p&gt;The Encrypted Client Hello (ECH) mechanism &lt;a href=&#34;https://tools.ietf.org/html/draft-ietf-tls-esni&#34;&gt;draft-spec&lt;/a&gt; is a way to plug a few privacy-holes that remain in the Transport Layer Security (TLS) protocol that&amp;rsquo;s used as the security layer for the web. OpenSSL is a widely used library that provides an implementation of the TLS protocol. The &lt;a href=&#34;https://defo.ie/&#34;&gt;DEfO project&lt;/a&gt; has developed an implementation of ECH for OpenSSL, and proof-of-concept implementations of various clients and servers that use OpenSSL, and other TLS libraries, as a demonstration and for interoperability testing. DEfO is funded by the Open Technology Fund (OTF).&lt;/p&gt;</description>
    </item>
    <item>
      <title>DEfO - Developing ECH for OpenSSL (round two)</title>
      <link>https://guardianproject.info/2023/11/09/defo-developing-ech-for-openssl-round-two/</link>
      <pubDate>Thu, 09 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/11/09/defo-developing-ech-for-openssl-round-two/</guid>
      <description>&lt;p&gt;Encrypted ClientHello (ECH) plugs a privacy-hole in TLS, hiding previously visible details from network observers. The most important being the name of the web-site the client wishes to visit (the Server Name Indication or SNI).  This can be a major privacy leak, like when accessing a dissident news source hosted on a Content Delivery Network (&lt;a href=&#34;https://en.wikipedia.org/wiki/Content_delivery_network&#34;&gt;CDN&lt;/a&gt;). A visible domain name also provides a straightforward method for censors to block websites and internet services. &lt;a href=&#34;https://www.tolerantnetworks.com/about-us.html&#34;&gt;Tolerant Networks Limited&lt;/a&gt; and the Guardian Project successfully ran the &lt;a href=&#34;https://www.opentech.fund/&#34;&gt;OTF&lt;/a&gt;-funded &lt;a href=&#34;https://defo.ie/&#34;&gt;DEfO&lt;/a&gt; project that &lt;a href=&#34;https://guardianproject.info/2021/11/30/implementing-tls-encrypted-client-hello/&#34;&gt;developed interoperable implementations&lt;/a&gt; of ECH for OpenSSL, Conscrypt and, via those libraries, a range of ECH-enabled web servers and clients.  This second funded project, DEfO-2, is a timely continuation of that project from the same the team.  As needed for disambiguation, we use DEfO-1 to refer the completed project and DEfO-2 for this current project. When there’s no ambiguity, we use the DEfO acronym to cover both past and future work related to ECH for OpenSSL, related applications and other TLS stacks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FIFA2023 Report</title>
      <link>https://guardianproject.info/2023/11/03/fifa2023-report/</link>
      <pubDate>Fri, 03 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/11/03/fifa2023-report/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://web.archive.org/web/20231102110707/https://internetfreedom.africa/&#34;&gt;Forum on Internet Freedom in Africa (FIFAfrica)&lt;/a&gt; organized by the &lt;a href=&#34;https://web.archive.org/web/20231102060008/https://cipesa.org/&#34;&gt;Collaboration on International ICT Policy for East and Southern Africa (CIPESA)&lt;/a&gt; took place in September 26-29, 2023 in Dar es Salaam, Tanzania at the Hyatt Regency Hotel.&lt;/p&gt;&#xA;&lt;p&gt;The first two days - the &lt;a href=&#34;https://web.archive.org/web/20231103185024/https://whova.com/embedded/event/rWwmoMGALzfjDBkAPdWzA1K4LxMjt38D6BmWiph4wK4%3D/generating/?refer=undefined&amp;amp;day=0&#34;&gt;26th&lt;/a&gt; and &lt;a href=&#34;https://web.archive.org/web/20231103185107/https://whova.com/embedded/event/rWwmoMGALzfjDBkAPdWzA1K4LxMjt38D6BmWiph4wK4%3D/generating/?refer=undefined&amp;amp;day=1&#34;&gt;27th&lt;/a&gt; of September - were invite only. The rest of the days - &lt;a href=&#34;https://web.archive.org/web/20231103185923/https://whova.com/embedded/event/rWwmoMGALzfjDBkAPdWzA1K4LxMjt38D6BmWiph4wK4%3D/generating/?refer=undefined&amp;amp;day=2&#34;&gt;28th&lt;/a&gt; and &lt;a href=&#34;https://web.archive.org/web/20231103190038/https://whova.com/embedded/event/rWwmoMGALzfjDBkAPdWzA1K4LxMjt38D6BmWiph4wK4%3D/generating/?refer=undefined&amp;amp;day=3&#34;&gt;29th&lt;/a&gt; of September - were meant for all the other participating attendees.&lt;/p&gt;&#xA;&lt;p&gt;The theme of the event was &amp;ldquo;The Internet Freedom we want for Africa&amp;rdquo; which was highlighted during the &lt;a href=&#34;https://web.archive.org/web/20231103190144/https://whova.com/embedded/session/rWwmoMGALzfjDBkAPdWzA1K4LxMjt38D6BmWiph4wK4%3D/3354886/?widget=primary&#34;&gt;opening ceremony&lt;/a&gt;. It was well organized with a dedicated media and photography team who did a great job in their coverage. Attendees and attending organizations were diverse coming from all over the world. They were not only limited to digital security folks but also there were attendees from academia, law, policy and government.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Achieve Onion Layers of Security with the Triad of Apple-tizing Apps!</title>
      <link>https://guardianproject.info/2023/07/25/achieve-onion-layers-of-security-with-the-triad-of-apple-tizing-apps/</link>
      <pubDate>Tue, 25 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/07/25/achieve-onion-layers-of-security-with-the-triad-of-apple-tizing-apps/</guid>
      <description>&lt;p&gt;&lt;em&gt;Our summer intern Alfred just graduated high-school and is preparing to attend a major university to focus on a technical degree. He has a personal interest in privacy and security, and is working with us on a variety of projects this summer as part of a broad, crash-course in all things Guardian Project!&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Last week, I worked with three different apps for the iPhone that, when they work together, allow for a secure and private mobile internet experience. Since they all build on the Tor Network, they also offer an untraceable way to share and download media. My task was to test the user experience in these apps and see how they interact with each other and to make sure that they’re working in the intended ways following a test plan.&lt;/p&gt;</description>
    </item>
    <item>
      <title>F-Droid&#39;s Community-controlled Backup Ceremony</title>
      <link>https://guardianproject.info/2023/07/15/f-droids-community-controlled-backup-ceremony/</link>
      <pubDate>Sat, 15 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/07/15/f-droids-community-controlled-backup-ceremony/</guid>
      <description>&lt;p&gt;(&lt;em&gt;Guest post from F-Droid, originally on &lt;a href=&#34;https://f-droid.org/2023/07/15/community-controlled-backup-ceremony.html&#34;&gt;f-droid.org&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;&#xA;&lt;p&gt;Seven core contributors and one board member met in Scotland, the birthplace of F-Droid, for the first in-person F-Droid team meeting.  One of the most pressing tasks we needed to take care of was setting up a contributor-controlled backup of all of our signing keys.  The requirements made it necessary to have a lengthy, in-person, consensus-driven planning session.  We found no good documentation of such a procedure, so we&amp;rsquo;re going out on a limb here and publishing the general outline of our process.  This process was informally audited by multiple people with varying expertise before the public key was used to encrypt anything.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Improving website resilience with LibResilient and IPFS</title>
      <link>https://guardianproject.info/2023/06/15/improving-website-resilience-with-libresilient-and-ipfs/</link>
      <pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/06/15/improving-website-resilience-with-libresilient-and-ipfs/</guid>
      <description>&lt;p&gt;We&amp;rsquo;re always looking for techniques to make services more resilient to all&#xA;sorts of issues. That&amp;rsquo;s why we took special interest in&#xA;&lt;a href=&#34;https://resilient.is/&#34;&gt;LibResilient&lt;/a&gt; and mapped out it&amp;rsquo;s capabilities.  It&amp;rsquo;s a&#xA;JavaScript library for decentralized content delivery in web-browsers and&#xA;markets itself as easy to deploy to any website. We&amp;rsquo;ve looked at LibResilient&#xA;primarily in the context of static websites.  While it should work with dynamic&#xA;websites too, that was out of focus for us.&lt;/p&gt;</description>
    </item>
    <item>
      <title>EU should not require sharing unpatched vulnerabilities</title>
      <link>https://guardianproject.info/2023/06/11/eu-should-not-require-sharing-unpatched-vulnerabilities/</link>
      <pubDate>Sun, 11 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/06/11/eu-should-not-require-sharing-unpatched-vulnerabilities/</guid>
      <description>&lt;p&gt;We, the undersigned organisations, write to express our concern with vulnerability disclosure requirements under the proposed Cyber Resilience Act (CRA). The CRA’s objective to encourage software publishers to patch vulnerabilities and report cyber incidents is salutary. However, the CRA’s mandatory disclosure of unmitigated vulnerabilities will undermine the security of digital products and the individuals who use them.&lt;/p&gt;&#xA;&lt;p&gt;The CRA would require organisations to disclose software vulnerabilities to government agencies within 24 hours of exploitation (&lt;em&gt;Cyber Resilience Act, Articles 11.1, 13.6, 14.4&lt;/em&gt;). However, such recently exploited vulnerabilities are unlikely to be mitigated within such a short time, leading to real-time databases of software with unmitigated vulnerabilities in the  possession of potentially dozens of government agencies. The more this kind of information is spread, the more likely it is to be misused for state intelligence or offensive purposes, or to be inadvertently exposed to adversaries before a mitigation is in place. In addition, laws that require disclosure of unmitigated vulnerabilities to government agencies create an international precedent that may be reflected by other countries.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Improving Usability of Tor on Smartphones in Latin America</title>
      <link>https://guardianproject.info/2023/06/02/improving-usability-of-tor-on-smartphones-in-latin-america/</link>
      <pubDate>Fri, 02 Jun 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/06/02/improving-usability-of-tor-on-smartphones-in-latin-america/</guid>
      <description>&lt;p&gt;Between 2022 and 2023 Guardian Project, with support from &lt;a href=&#34;https://okthanks.com&#34;&gt;Okthanks&lt;/a&gt; and the &lt;a href=&#34;https://torproject.org&#34;&gt;Tor Project&lt;/a&gt;, organized and participated in a total of 12 workshops in Ecuador, Mexico and Brazil with the participation of 161 people. The workshops focused both on the broad topic of “Tor for Smartphones”, while also taking deeper dives into specific topics like virtual private networks VPNs) and anonymous web browsing. Through a variety of methods, we gathered feedback from the participants in each of those sessions. We also ran detailed individual tests with volunteers to collect insights related to new features and usability improvements on specific apps.&#xA;Our top takeaways from this process were, as follows:&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF116 Conference Report: Friday March 31, 2023</title>
      <link>https://guardianproject.info/2023/04/04/ietf116-conference-report-friday-march-31-2023/</link>
      <pubDate>Tue, 04 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/04/04/ietf116-conference-report-friday-march-31-2023/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Five of the &lt;a href=&#34;https://www.ietf.org/how/meetings/116/&#34;&gt;116th IETF meeting&lt;/a&gt; in Yokohama Japan.  For the rundown on Day Four, see my &lt;a href=&#34;https://guardianproject.info/2023/03/30/ietf116-conference-report-thursday-march-30-2023/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;With a lot of focus on privacy with respect to Internet protocols, novel new cryptography schemes are an important requirement for new protocol designs.  For example, &lt;a href=&#34;https://datatracker.ietf.org/wg/ppm/about/&#34;&gt;Privacy Preserving Measurement&lt;/a&gt; is relying on new cryptography to support distributed aggregation of a wide range of measurements in the advertising domain as well as application telemetry.  &lt;a href=&#34;https://datatracker.ietf.org/wg/privacypass/about/&#34;&gt;Privacy Pass&lt;/a&gt; is relying on new cryptography to allow web browsing across the broad Internet after a single, lightweight authentication to an authority.  IETF Working Groups are encouraged to work with the &lt;a href=&#34;https://irtf.org/cfrg&#34;&gt;Crypto Forum Research Group&lt;/a&gt; of the Internet Research Task Force (&lt;a href=&#34;https://www.ietf.org/about/groups/irtf/&#34;&gt;IRTF&lt;/a&gt;) to develop, test and refine new cryptography techniques that meet defined security/privacy goals and can scale for Internet-wide use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF116 Conference Report: Thursday March 30, 2023</title>
      <link>https://guardianproject.info/2023/03/30/ietf116-conference-report-thursday-march-30-2023/</link>
      <pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/03/30/ietf116-conference-report-thursday-march-30-2023/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Four of the &lt;a href=&#34;https://www.ietf.org/how/meetings/116/&#34;&gt;116th IETF meeting&lt;/a&gt; in Yokohama Japan.  For the rundown on Day Three, see my &lt;a href=&#34;https://guardianproject.info/2023/03/30/ietf116-conference-report-wednesday-march-29-2023/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The IETF is getting serious about interoperability among messaging services (&lt;a href=&#34;https://www.eff.org/deeplinks/2022/04/eu-digital-markets-acts-interoperability-rule-addresses-important-need-raises&#34;&gt;this&lt;/a&gt; might have had something to do with it).  The charter for the Messaging Layer Security Working Group (MLS) specifically &lt;em&gt;excluded&lt;/em&gt; interoperability, though the group organized a draft that addressed the basic concepts that would allow MLS-compatible systems to federate. In early 2023, a new Working Group - More Instant Messaging Interoperability (&lt;a href=&#34;https://datatracker.ietf.org/group/mimi/about/&#34;&gt;MIMI&lt;/a&gt;) - was chartered to expand on the MLS federation work.  Given IETF&amp;rsquo;s relatively long and somewhat checkered history with messaging, the Working Group&amp;rsquo;s charter included this reminder to itself:&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF116 Conference Report: Wednesday March 29, 2023</title>
      <link>https://guardianproject.info/2023/03/30/ietf116-conference-report-wednesday-march-29-2023/</link>
      <pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/03/30/ietf116-conference-report-wednesday-march-29-2023/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Three of the &lt;a href=&#34;https://www.ietf.org/how/meetings/116/&#34;&gt;116th IETF meeting&lt;/a&gt; in Yokohama Japan.  For the rundown on Day Two, see my &lt;a href=&#34;https://guardianproject.info/2023/03/29/ietf116-conference-report-tuesday-march-29-2023/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The long-running work on &lt;a href=&#34;https://datatracker.ietf.org/wg/masque/about/&#34;&gt;MASQUE&lt;/a&gt; - proxying all network-layer datatypes over QUIC (HTTP/3) - is nearing completion, with the specification for &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-masque-connect-ip/&#34;&gt;Proxying IP in HTTP&lt;/a&gt; in IESG review.  With these components in place, the &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-schinazi-masque-proxy/&#34;&gt;original MASQUE concept&lt;/a&gt; - a non-probable relay for client traffic providing privacy guarantees - has been revived, now defined within the new framework and leveraging &lt;a href=&#34;https://www.ietf.org/archive/id/draft-ietf-httpbis-unprompted-auth-02.html&#34;&gt;HTTP Unprompted Authentication&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF116 Conference Report: Tuesday March 28, 2023</title>
      <link>https://guardianproject.info/2023/03/29/ietf116-conference-report-tuesday-march-28-2023/</link>
      <pubDate>Wed, 29 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/03/29/ietf116-conference-report-tuesday-march-28-2023/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Two of the &lt;a href=&#34;https://www.ietf.org/how/meetings/116/&#34;&gt;116th IETF meeting&lt;/a&gt; in Yokohama Japan.  For the rundown on Day One, see my &lt;a href=&#34;https://guardianproject.info/2023/03/28/ietf116-conference-report-monday-march-28-2023/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://datatracker.ietf.org/wg/ohai/about/&#34;&gt;OHAI Working Group&lt;/a&gt; has submitted the core draft of &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-ohai-ohttp/&#34;&gt;Oblivious HTTP Application Intermediation&lt;/a&gt; to the RFC Editor for editorial finalization and publication. OHAI is designed to support &lt;em&gt;transational&lt;/em&gt; uses of the HTTP protocol that seek IP address privacy (by means of a relay pair, one associated with the client and one associated with the target resource). The target resource is, thus, said to be &lt;em&gt;oblivious&lt;/em&gt; to the requester&amp;rsquo;s IP address.  While the initially-imagined use case for OHAI was access to the DNS service (with some in the IETF feeling DNS-over-HTTP did not go far enough to protect user privacy), the dominant  use case imagined today is &lt;em&gt;telemetry&lt;/em&gt; - monitoring vendor-, application- or operating system-defined usage parameters on centralized systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF116 Conference Report: Monday March 27, 2023</title>
      <link>https://guardianproject.info/2023/03/28/ietf116-conference-report-monday-march-27-2023/</link>
      <pubDate>Tue, 28 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/03/28/ietf116-conference-report-monday-march-27-2023/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post begins a daily blog, live from the 116th meeting of the &lt;a href=&#34;https://www.ietf.org/how/meetings/116/&#34;&gt;Internet Engineering Task Force&lt;/a&gt; in Yokohama, Japan, March 25-31, 2023.  We&amp;rsquo;re focusing on standards activities of importance to the Internet Freedom community.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Since IETF114 (&lt;a href=&#34;https://guardianproject.info/2022/07/28/ietf114-conference-report-thursday-july-28-2022/&#34;&gt;report&lt;/a&gt;), the &lt;a href=&#34;https://datatracker.ietf.org/wg/ppm/about/&#34;&gt;Privacy Preserving Measurement Working Group&lt;/a&gt; has been deliberating over two distinct proposals offering very different technical methodologies for undertaking measurement activities while respecting user privacy. &lt;a href=&#34;https://datatracker.ietf.org/doc/html/draft-dss-star&#34;&gt;STAR&lt;/a&gt; offers an approach called &lt;em&gt;k-anonymity&lt;/em&gt; - reporting a measurement value only if &lt;em&gt;k&lt;/em&gt; or more parties are also reporting the same value. This approach theoretically prevents rare values being used to single-out individuals.  Distributed Aggregation Protocol, &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-ppm-dap/&#34;&gt;DAP&lt;/a&gt;, uses an approach that distributes individual measures across a set of aggregators, none of which gets to see all the granular measurement data - the fully-aggregated total only seen by the third-party who requested it (who, in turn, gets to see none of the granular measurements).  At IETF116 we&amp;rsquo;re learning about the operational experience with these technologies, with multiple implementations of both running in different testbeds.  &lt;a href=&#34;https://datatracker.ietf.org/meeting/116/materials/slides-116-ppm-poplarstar-measurements&#34;&gt;Performance analysis&lt;/a&gt; has also been undertaken.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Arti, next-gen Tor on mobile</title>
      <link>https://guardianproject.info/2023/03/04/arti-next-gen-tor-on-mobile/</link>
      <pubDate>Sat, 04 Mar 2023 10:00:00 -0400</pubDate>
      <guid>https://guardianproject.info/2023/03/04/arti-next-gen-tor-on-mobile/</guid>
      <description>&lt;p&gt;For software projects with recurring bugs, efficiency or security issues&#xA;there&amp;rsquo;s a joke making the rounds in the software industry: &amp;ldquo;Let&amp;rsquo;s re-write it&#xA;in &lt;a href=&#34;https://en.wikipedia.org/wiki/Rust_(programming_language)&#34;&gt;Rust&lt;/a&gt;!&amp;rdquo;  It&amp;rsquo;s a&#xA;fairly new low-level programming language with the declared goal to help&#xA;developers avoid entire classes of bugs, security issues and other pitfalls.&#xA;Re-writing software is very time consuming, so it rarely happens, especially&#xA;when just one more fix will keep a project up and running.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Steps towards trusted VPNs</title>
      <link>https://guardianproject.info/2023/02/28/steps-towards-trusted-vpns/</link>
      <pubDate>Tue, 28 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2023/02/28/steps-towards-trusted-vpns/</guid>
      <description>&lt;p&gt;VPNs have become quite popular in recent years for a number of reasons, and more and more they are being touted as a privacy tool.  The question is whether using a VPN does improve privacy.  It is clear that VPNs are quite useful for getting access to things on the internet when direct connections are blocked.  VPN providers include a number of tactics in both their client apps and server infrastructure to ensure that their users are able to make a connection.  Then once users are connected, all of their traffic that goes over the VPN will see the internet from the point of view of the VPN&amp;rsquo;s server.  That is how VPNs &amp;ldquo;unblock&amp;rdquo; the internet.  In contrast, some are using VPNs to selectively block things, like making a system-wide &lt;a href=&#34;https://www.digitalocean.com/community/tutorials/how-to-block-advertisements-at-the-dns-level-using-pi-hole-and-openvpn-on-ubuntu-16-04&#34;&gt;adblocker&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Scanning apps, off the record</title>
      <link>https://guardianproject.info/2022/09/28/scanning-apps-off-the-record/</link>
      <pubDate>Wed, 28 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/09/28/scanning-apps-off-the-record/</guid>
      <description>&lt;p&gt;Smart phones have brought us so many wonderful capabilities.  They let people around the world access vast realms of information.  They let app developers solve problems large and small in a way most relevent to their local context.  They are personal computers for the world.  They also have given surveillance capitalism an unprecedented reach into everyone&amp;rsquo;s lives. Repressive governments use them in ways that the East German Stasi secret police could only have dreamed of.  And as promising as artificial intelligence is, it is also threatening humanity.  People around the world are pushing back.  This public interest work requires technical inspection of apps.  There are organizations highlighting algorithmic transparency and calling out surveillance capitalism.  Journalists are linking apps into key stories about the misdeeds of powerful companies.  Activists are exposing the hidden machinations of their governments.  All of these people require technical skills to see what a given app is going.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Search for Ethical Apps: Let&#39;s start with governments</title>
      <link>https://guardianproject.info/2022/09/01/the-search-for-ethical-apps-lets-start-with-governments/</link>
      <pubDate>Thu, 01 Sep 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/09/01/the-search-for-ethical-apps-lets-start-with-governments/</guid>
      <description>&lt;p&gt;Governments across the world are moving services to mobile apps.  The vast majority of these apps are only available in the Google Play store or in the Apple App store.  Installing apps from these services requires users to agree to their terms of service.  This means governments require their citizens to sign opaque and privacy invading contracts with foreign Big Tech in order to use digital services.  This feeds ever more into Big Tech data control, filtering, and information bubbles.  There are some exceptions here, like China has multiple app stores that are popular.  Chinese Big Tech also require restrictive terms of service agreements.  Additionally, many of apps are developed by the same firms that are tied into the surveillance capitalism ecosystem.  So they include features that track the end users. The governments are not demanding data transparency, and these firms have not been delivering it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Serving Websites Privately Over Tor Onion Services (From Your Laptop!)</title>
      <link>https://guardianproject.info/2022/08/29/serving-websites-privately-over-tor-onion-services-from-your-laptop/</link>
      <pubDate>Mon, 29 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/08/29/serving-websites-privately-over-tor-onion-services-from-your-laptop/</guid>
      <description>&lt;p&gt;In this day and age when our data is consistently being tracked and profited off of, sharing information safely and securely is difficult. However, that does not necessarily mean that all network services are subject to such scrutiny. Users now have the ability to combine the security of HTTPS with the privacy benefits of Tor Browser and share information through Tor’s anonymous network services – &lt;a href=&#34;https://community.torproject.org/onion-services/&#34;&gt;Onion Services&lt;/a&gt;. By using an onion service, users can hide their location while active, connect to other Tor users, and retain their privacy throughout. But to do so, one needs to know how to set up an Onion Service.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DWeb versus Web3: An Intern&#39;s Journey!</title>
      <link>https://guardianproject.info/2022/08/19/dweb-versus-web3-an-interns-journey/</link>
      <pubDate>Fri, 19 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/08/19/dweb-versus-web3-an-interns-journey/</guid>
      <description>&lt;p&gt;Close your eyes and imagine. You are sitting, designing the next game-changing innovative idea; however, you are not worried about any information leakage or spread, as you are in control. You not only hold ownership of your data, but with each online activity, your fear of being tracked dissipates more. This new internet you explore on understands each input, tailoring the content to your specific needs as it no longer runs on basic commands, but rather uses the combination of technologies and concepts such as machine learning, big data, and decentralized ledger technology to process information in a smart, human-like manner. This image in your mind is no longer a distant fantasy, but rather a closely approaching reality – this reality is the decentralized web, otherwise referred to as the DWeb.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Conference Report: Friday July 29, 2022</title>
      <link>https://guardianproject.info/2022/07/29/ietf114-conference-report-friday-july-29-2022/</link>
      <pubDate>Fri, 29 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/29/ietf114-conference-report-friday-july-29-2022/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Five of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;114th IETF meeting&lt;/a&gt; in Philadelphia USA. For the rundown on Day Four, see my &lt;a href=&#34;https://guardianproject.info/2022/07/28/ietf114-conference-report-thursday-july-28-2022/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;A quiet day today with only the &lt;a href=&#34;https://datatracker.ietf.org/wg/mls/charter/&#34;&gt;Messaging Layer Security&lt;/a&gt; Working Group holding its session. Draft 16 of the &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-mls-protocol/&#34;&gt;MLS protocol&lt;/a&gt; completed last-call in mid-July and has been submitted for review after significant technical and editorial feedback from the working group. Are we getting close (again)?  The &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-mls-architecture/&#34;&gt;MLS Architecture&lt;/a&gt; document was lightly revised and version 8 submitted for review.  Two new drafts were presented: &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-mahy-mls-content-neg/&#34;&gt;MLS Content Negotiation&lt;/a&gt; and &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-robert-mls-extensions/&#34;&gt;MLS Extensions&lt;/a&gt;. The former has yet to be adopted as a Working Group item, but the latter was adopted during IETF114 (before the MLS session, over the mailing list).&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Conference Report: Thursday July 28, 2022</title>
      <link>https://guardianproject.info/2022/07/28/ietf114-conference-report-thursday-july-28-2022/</link>
      <pubDate>Thu, 28 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/28/ietf114-conference-report-thursday-july-28-2022/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Four of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;114th IETF meeting&lt;/a&gt; in Philadelphia USA. For the rundown on Day Three, see my &lt;a href=&#34;https://guardianproject.info/2022/07/27/ietf114-conference-report-wednesday-july-27-2022/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;At IETF112 (online) a formal Birds of a Feather (BoF) session was held on the concept of &lt;a href=&#34;https://datatracker.ietf.org/meeting/112/materials/slides-112-priv-chair-slides-agenda-01&#34;&gt;Privacy Preserving Measurement&lt;/a&gt;.  A Working Group was &lt;a href=&#34;https://datatracker.ietf.org/wg/ppm/about/&#34;&gt;chartered&lt;/a&gt; and, at IETF113 in Vienna, we were treated to an incredibly detailed presentation on &lt;a href=&#34;https://eprint.iacr.org/2021/576.pdf&#34;&gt;Prio&lt;/a&gt;, an academic concept for supporting privacy in the context of Internet-scale measurement. Quickly following that presentation was an IETF proposal for a &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-ppm-dap/&#34;&gt;defined protocol&lt;/a&gt; for &lt;em&gt;distributed aggregation&lt;/em&gt; of measurement data, based on Prio&amp;rsquo;s core concepts and using a range of cryptographic and system architecture techniques to separate measurements from the identities of the human users being measured.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Conference Report: Wednesday July 27, 2022</title>
      <link>https://guardianproject.info/2022/07/27/ietf114-conference-report-wednesday-july-27-2022/</link>
      <pubDate>Wed, 27 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/27/ietf114-conference-report-wednesday-july-27-2022/</guid>
      <description>&lt;p&gt;*Day Three of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;114th IETF meeting&lt;/a&gt; in Philadelphia USA. For the rundown on Day Two, see my &lt;a href=&#34;https://guardianproject.info/2022/07/26/ietf114-conference-report-tuesday-july-26-2022/&#34;&gt;daily report&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Interest is starting to consolidate on the need for additional definition for serving media over the QUIC transport layer, particularly for streaming and conferencing applications.  Following an informal gathering at IETF113 in March 2022, a formal Birds of Feather session met today with a draft &lt;a href=&#34;https://datatracker.ietf.org/meeting/114/materials/slides-114-moq-moq-charter-proposal-00&#34;&gt;charter proposal&lt;/a&gt; and two draft documents describing the intended &lt;a href=&#34;https://www.ietf.org/id/draft-gruessing-moq-requirements-02.html&#34;&gt;use cases&lt;/a&gt; and a &lt;a href=&#34;https://www.ietf.org/id/draft-jennings-moq-quicr-proto-01.html&#34;&gt;protocol&lt;/a&gt;. &lt;a href=&#34;https://datatracker.ietf.org/meeting/114/materials/slides-114-moq-if-time-permits-quicr-01&#34;&gt;Here&amp;rsquo;s&lt;/a&gt; a more visual overview.  There was broad concensus (at this well-attended session) as to the need for this work, but a split between one camp that sought a much narrower set of use cases (not wanting to &lt;em&gt;boil the Internet&lt;/em&gt; as it were) and another who wanted to &lt;em&gt;solve this problem once&lt;/em&gt;. This will be addressed as the BoF leaders work towards a vote on chartering the effort.  Either way, this is substantial work ahead.  I mention this here not so much in the realm of privacy as to look towards a future where QUIC&amp;rsquo;s efficiency and scalability benefits might make media-rich services available to those of lesser economic means or with mediocre connectivity.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Conference Report: Tuesday July 26, 2022</title>
      <link>https://guardianproject.info/2022/07/26/ietf114-conference-report-tuesday-july-26-2022/</link>
      <pubDate>Tue, 26 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/26/ietf114-conference-report-tuesday-july-26-2022/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day Two of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;114th IETF meeting&lt;/a&gt; in Philadelphia USA. For the rundown on Day One, see my &lt;a href=&#34;https://guardianproject.info/2022/07/25/ietf114-conference-report-monday-july-25-2022/&#34;&gt;daily report&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Lucas Pardue, of Cloudflare and co-chair of the QUIC Working Group, gave a not-so-tongue-in-cheek &lt;a href=&#34;https://datatracker.ietf.org/meeting/114/materials/slides-114-anrw-sessa-keynote-00&#34;&gt;talk&lt;/a&gt; about the breakdown of the OSI layering model of the Internet. His focus was on the &lt;em&gt;top&lt;/em&gt; of the stack, illustrating handsomely what QUIC and HTTP/3 have done (unknowingly to most) to our perception of layers.  A key challenge: tools for HTTP/1 are widely available and the protocol and its impacts are widely understood.  HTTP/2 and HTTP/3? Not so much (both are binary, not text-based, protocols).  Yet, here in mid-2022, the world of the Internet is predominantly (91%!) HTTP/2 and HTTP/3 traffic.  Similarly, TLS/1.3 and QUIC represent 87% of traffic. And many of the now-being-standardized protocols for privacy insert several layers of proxy into every transaction. From a &lt;em&gt;sound knowledge&lt;/em&gt; perspective, we seem to have taken a rather quick, and rather deep, step backwards.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Conference Report: Monday July 25, 2022</title>
      <link>https://guardianproject.info/2022/07/25/ietf114-conference-report-monday-july-25-2022/</link>
      <pubDate>Mon, 25 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/25/ietf114-conference-report-monday-july-25-2022/</guid>
      <description>&lt;p&gt;&lt;em&gt;Day One of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;114th IETF meeting&lt;/a&gt; in Philadelphia USA.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;With privacy a key consideration in new protocol design, cryptography has become a major focus of IETF activities.  The Internet Research Task Force (IRTF) has the &lt;a href=&#34;https://irtf.org/cfrg&#34;&gt;Crypto Forum Research Group&lt;/a&gt; where new cryptography schemes are brought forward and vetted for use in IETF protocols.  Well, &lt;em&gt;new&lt;/em&gt; is a misnomer. Much of the mathematics has long been defined, at least at its core, and the work is rather being brought into the IETF context where important engineering considerations apply: use of memory (at rest or in flight), processing required, round-trips required, etc.. Of significance at this meeting, mechanisms for &lt;em&gt;blinding&lt;/em&gt; a digitial signature are in high demand given the prevalence of multi-tiered approaches to privacy (that is, approaches that insert one or more proxies between entities in a transaction).  Something similar is in the works for cryptographic keys. A number of IETF protocol specifications, still in development, are in line to receive these mathematical gems including &lt;a href=&#34;https://datatracker.ietf.org/group/privacypass/about/&#34;&gt;Privacy Pass&lt;/a&gt;, &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-private-access-tokens/&#34;&gt;Private Access Tokens&lt;/a&gt;, &lt;a href=&#34;https://datatracker.ietf.org/wg/ohai/charter/&#34;&gt;Oblivious HTTP Application Intermediation&lt;/a&gt; and others.  An excellent summary of the National Institute for Standards and Technology (NIST) &lt;a href=&#34;https://csrc.nist.gov/publications/detail/nistir/8413/final&#34;&gt;Post-Quantum Cryptography &lt;em&gt;contest&lt;/em&gt;&lt;/a&gt; was also provided. The topic itself, let alone the solutions chosen, is not for the weak-kneed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF114 Hackathon Report: Sunday July 24, 2022</title>
      <link>https://guardianproject.info/2022/07/24/ietf114-hackathon-report-sunday-july-24-2022/</link>
      <pubDate>Sun, 24 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/24/ietf114-hackathon-report-sunday-july-24-2022/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post begins a daily blog, live from the 114th meeting of the &lt;a href=&#34;https://www.ietf.org/how/meetings/114/&#34;&gt;Internet Engineering Task Force&lt;/a&gt; in Philadelpha Pennsylvania USA, July 23-29, 2022 (in-person meetings having restarted in March 2022 after the COVID pandemic abated). We&amp;rsquo;re focusing on standards activities of importance to the Internet Freedom community.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.ietf.org/how/runningcode/hackathons/114-hackathon/&#34;&gt;Hackathon&lt;/a&gt; event kicks off each IETF event, with projects that run the gamut from early implementations of just-emerging specifications to full multi-vendor interoperability testing of nearly-mature protocols. At this event, I sat in on the &lt;a href=&#34;https://datatracker.ietf.org/wg/masque/about/&#34;&gt;MASQUE&lt;/a&gt; team&amp;rsquo;s effort to commence work on the new &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-masque-connect-ip/&#34;&gt;CONNECT-IP&lt;/a&gt; specification. With the recent completion of two key specifications -  &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-masque-connect-udp/&#34;&gt;CONNECT-UDP&lt;/a&gt; and &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-masque-h3-datagram/&#34;&gt;H3 Datagrams&lt;/a&gt; - MASQUE has become IETF&amp;rsquo;s solution for proxying all types of network traffic over QUIC and HTTP/3, including VPN and other privacy-focused scenarios. CONNECT-IP will complete the trio.  But this initial effort didn&amp;rsquo;t go well.  Google and Ericcson (co-authors on the spec) had brought teams who, indeed, implemented the key protocol elements of CONNECT-IP live and in-the-moment but were both stymied setting up testbeds that could deliver raw IP packets for routing by this new code. Wait, you might say, aren&amp;rsquo;t these network engineers?  True, but it was mostly the practicalities that got in the way - only laptops as test machines, working from the open source &lt;a href=&#34;https://github.com/google/quiche&#34;&gt;QUICHE&lt;/a&gt; repository on a machine that also hosts an environment for building production code, even deciding what sort of packets could be used for testing and where to route them. These are the frustrations of a first-ever effort.&lt;/p&gt;</description>
    </item>
    <item>
      <title>RightsCon Report: Surveillance and Facial Recognition: Protection or Instruments of Control?</title>
      <link>https://guardianproject.info/2022/07/20/rightscon-report-surveillance-and-facial-recognition-protection-or-instruments-of-control/</link>
      <pubDate>Wed, 20 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/07/20/rightscon-report-surveillance-and-facial-recognition-protection-or-instruments-of-control/</guid>
      <description>&lt;p&gt;Safety is one of the foremost questions we seek to answer as we roam about in our everyday lives, taking precautions to reduce the likelihood of all threats. It is the very reasoning behind the use of surveillance technology from civilians to the state government, as it hinders crime through fear of persecution and retribution. However, variables such as the time taken for assistance can limit this objective. In these instances, surveillance is not a means of protection, but rather justice, as facial recognition technology can discern the perpetrator to bring to justice. However, the concern arises: do those with the access to this means of seeking justice utilize it for other purposes?&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Conference Report: Friday March 25, 2022</title>
      <link>https://guardianproject.info/2022/03/28/ietf113-conference-report-friday-march-25-2022/</link>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/28/ietf113-conference-report-friday-march-25-2022/</guid>
      <description>&lt;p&gt;Final day of the 113th IETF meeting, in Vienna Austria.&lt;/p&gt;&#xA;&lt;p&gt;The IETF is looking to make a clear contribution to the problem of hyper-aggressive measurement of user activities on the Internet and the many misuses thereof.  To do so, the IETF recognizes that some measurement is important but that many desirable measurements require data most people consider sensitive.  It also recognizes that aggregated measurements often provide the most value, rather than individual ones.  Yet, today, parties interested in measurement need to collect and store individual records in order to aggregate them, exposing themselves to potential violations of their privacy agreements with users (or governments) and to theft of that data by outsiders.  Instead, IETF is looking at ways this aggregation can be managed in ways that protect user privacy while still providing much of the statistical power needed.  The &lt;a href=&#34;https://datatracker.ietf.org/group/ppm/about/&#34;&gt;Privacy Preserving Measurement Working Group&lt;/a&gt; has formed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Conference Report: Thursday March 24, 2022</title>
      <link>https://guardianproject.info/2022/03/27/ietf113-conference-report-thursday-march-24-2022/</link>
      <pubDate>Sun, 27 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/27/ietf113-conference-report-thursday-march-24-2022/</guid>
      <description>&lt;p&gt;Day four of the 113th IETF meeting, in Vienna Austria.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://datatracker.ietf.org/group/privacypass/about/&#34;&gt;Privacy Pass&lt;/a&gt; - originating at Cloudflare in 2017 as a solution to user frustration with CAPTCHA - has been in full swing as an IETF activity since mid-2020.  Privacy Pass allows a client to solve some form of validity check (a CAPTCHA, a puzzle, a user-pass authentication) to then receive some number of tokens to be used at websites accepting Privacy Pass, thus eliminating the need to do a CAPTCHA at each site.  Sites hosted on large CDNs like Cloudflare benefit (Cloudflare provides the service for them) and users get a more convenient experience.  Users accessing the Internet through Tor are even more positively affected since they are most prone to CAPTCHA.  Privacy Pass is now in Version 3 and working to support a multi-issuer environment to provide another uplift to the user experience (tokens can be validated across issuers).  Just prior to this IETF meeting, a standardized mechanism for exchanging Privacy Pass tokens was adopted by the Working Group - &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-privacypass-auth-scheme/&#34;&gt;The Privacy Pass HTTP Authentication Scheme&lt;/a&gt;. Both request and response mechanisms are provided so that use of (or demand for) the token can be either server- or client-initiated. Going forward, it will be interesting to see if Privacy Pass benefits mostly the web browsing environment or finds its way into applications using HTTP as a substrate for richer styles of interaction.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Conference Report: Wednesday March 23, 2022</title>
      <link>https://guardianproject.info/2022/03/26/ietf113-conference-report-wednesday-march-23-2022/</link>
      <pubDate>Sat, 26 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/26/ietf113-conference-report-wednesday-march-23-2022/</guid>
      <description>&lt;p&gt;Day three of the 113th IETF meeting, in Vienna Austria.&lt;/p&gt;&#xA;&lt;p&gt;Messaging Layer Security (&lt;a href=&#34;https://datatracker.ietf.org/wg/mls/about/&#34;&gt;MLS&lt;/a&gt;) is (finally) closing in on &lt;a href=&#34;https://www.ietf.org/about/glossary/?query=wglc&#34;&gt;Last Call&lt;/a&gt; at protocol Draft 14 and architecture Draft 7 (which will be taken forward together). Sometimes referred to as the &lt;em&gt;TLS for messaging systems&lt;/em&gt;, Messaging Layer Security creates a uniform secure group discussion protocol, scalable to very large groups and providing similarly uniform security guarantees across providers. The near completion of the architecture and protocol drafts, and commencement of interoperability testing has prompted the Working Group to dust off the &lt;a href=&#34;https://datatracker.ietf.org/doc/html/draft-ietf-mls-federation&#34;&gt;Federation draft&lt;/a&gt; as the next object of their affection.  Will I be able to connect my &lt;a href=&#34;https://wire.com/en/&#34;&gt;Wire&lt;/a&gt; client to the &lt;a href=&#34;https://www.messenger.com/&#34;&gt;Facebook Messenger&lt;/a&gt; server? Don&amp;rsquo;t hold your breath, but in the meantime you&amp;rsquo;ll be able to enjoy the manifest benefits of secure group chat (with security guarantees as high as the industry knows how to produce) on your own network.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Conference Report: Tuesday March 22, 2022</title>
      <link>https://guardianproject.info/2022/03/24/ietf113-conference-report-tuesday-march-22-2022/</link>
      <pubDate>Thu, 24 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/24/ietf113-conference-report-tuesday-march-22-2022/</guid>
      <description>&lt;p&gt;Day two of the &lt;a href=&#34;https://www.ietf.org/how/meetings/113/&#34;&gt;113th IETF meeting&lt;/a&gt;, in Vienna Austria.  The crisis in Ukraine is on everyone&amp;rsquo;s mind, lending immediacy to the work of the Global Access to the Internet for All (GAIA) Research Group. While past and continuing work has focused on Internet access for the world&amp;rsquo;s population (especially those disadvantaged by economics, distance, mobility, and social constraints) the situation in Ukraine resulting from military activities give cause for both concern and hope.  While communications access points have been obviously targeted, the inherently decentralized topology of the Internet infrastructure in Ukraine has afforded surprising resiliency, increased by the willingness of nominal competitors to patch the communication systems back together for the good of all.  Few will remember that this resiliency from military attack was the raison d&amp;rsquo;être for ARPANet, predecessor to the Internet.  Perhaps, in this era of increasing centralization (hardware and software), the crisis in Ukraine will give us the impetus to consider changes to the trajectory of consolidation we&amp;rsquo;ve allowed to occur. We&amp;rsquo;ll follow up on this topic tomorrow after the Human Rights Protocol Considerations (HRPC) Research Group who will take up the topic of Regional Internet Blocking.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Conference Report: Monday March 21, 2022</title>
      <link>https://guardianproject.info/2022/03/21/ietf113-conference-report-monday-march-21-2022/</link>
      <pubDate>Mon, 21 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/21/ietf113-conference-report-monday-march-21-2022/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s opening day at the &lt;a href=&#34;https://www.ietf.org/how/meetings/113/&#34;&gt;113th IETF meeting&lt;/a&gt;, the first in-person meeting in two years due to the COVID pandemic and being held in Vienna Austria. We&amp;rsquo;re focusing on standards activities of importance to the Internet Freedom community.&lt;/p&gt;&#xA;&lt;p&gt;New work is brought to the IETF via Birds-of-a-Feature sessions and also each technical area&amp;rsquo;s Dispatch Working Group.  The Application area often sees the most unique and interesting ideas and this meeting was no exception.  The [Open Ethics Initiative] (&lt;a href=&#34;https://openethics.ai/&#34;&gt;https://openethics.ai/&lt;/a&gt;) introduced its idea for an &lt;em&gt;ethics disclosure&lt;/em&gt; or &lt;a href=&#34;https://openethics.ai/oetp/&#34;&gt;transparency protocol&lt;/a&gt; to help promote trust among users and service providers in a way similar to nutrition labelling on foods.  Two &lt;a href=&#34;https://www.ietf.org/archive/id/draft-mahy-dispatch-immi-content-00.html&#34;&gt;new&lt;/a&gt; &lt;a href=&#34;https://www.ietf.org/archive/id/draft-mahy-dispatch-immi-mls-mime-00.html&#34;&gt;drafts&lt;/a&gt; have been written related to the format of data exchange among messaging services. I know what you&amp;rsquo;re thinking: &amp;ldquo;but messaging services don&amp;rsquo;t interoperate&amp;rdquo;.  Exactly. These drafts are a push to get that to happen, initially in the context of the Messaging Layer Security (&lt;a href=&#34;https://datatracker.ietf.org/wg/mls/about/&#34;&gt;MLS&lt;/a&gt;) effort.  Along the same lines, a plea was made to liberate messaging from the confines of the encapsulating (and in some cases proprietary) protocols, to be used as first-class network transactions on their own via the &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-spinella-event-streaming-open-network/&#34;&gt;Event Streaming Open Network&lt;/a&gt;. And, the team doing Encrypted Client Hello (&lt;a href=&#34;https://tools.ietf.org/id/draft-ietf-tls-esni-13.html&#34;&gt;ECH&lt;/a&gt;) introduced an idea to &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-farrell-tls-wkesni/&#34;&gt;liberate ECH&amp;rsquo;s host configuration information from the DNS&lt;/a&gt; to which some folks believe it is inextricably bound.  Well, they didn&amp;rsquo;t present it &lt;em&gt;quite&lt;/em&gt; that way, but&amp;hellip; Liberation was the theme of the event, it seems!&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF113 Hackathon Project</title>
      <link>https://guardianproject.info/2022/03/20/ietf113-hackathon-project/</link>
      <pubDate>Sun, 20 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/03/20/ietf113-hackathon-project/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post begins a daily blog, live from IETF113 in Vienna Austria, March 19-25, 2022 (first in-person meeting after six remote-only meetings during the COVID pandemic).&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://www.ietf.org/how/runningcode/hackathons/113-hackathon/&#34;&gt;Hackathon&lt;/a&gt; event kicks off IETF and, at this meeting,  we picked up work originally done by one of our teammates implementing version 5 of &lt;a href=&#34;https://www.ietf.org/archive/id/draft-schinazi-httpbis-transport-auth-05.html&#34;&gt;Internet Draft HTTP Transport Authentication&lt;/a&gt;. &lt;em&gt;HTTP Transport Authentication&lt;/em&gt; is designed to authenticate such protocol flows in a manner that does not reveal any information to an attacker during failure cases.  Therefore, applications using &lt;em&gt;HTTP Transport Authentication&lt;/em&gt; are resistant to active probing by network adversaries.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Privacy Preserving Analytics in the Real World: Mailvelope Case Study</title>
      <link>https://guardianproject.info/2022/02/28/privacy-preserving-analytics-in-the-real-world-mailvelope-case-study/</link>
      <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/02/28/privacy-preserving-analytics-in-the-real-world-mailvelope-case-study/</guid>
      <description>&lt;p&gt;We love &lt;a href=&#34;https://mailvelope.com/&#34;&gt;Mailvelope&lt;/a&gt;. It&amp;rsquo;s a popular browser extension for encrypting email messages. Now, &lt;a href=&#34;https://cleaninsights.org&#34;&gt;Clean Insights&lt;/a&gt; is helping Mailvelope understand which webmail providers are most popular with their users so they can prioritize their development efforts.&lt;/p&gt;&#xA;&lt;p&gt;Anyone who has written software knows it takes hard work to craft a great user experience. That&amp;rsquo;s even more challenging in Mailvelope&amp;rsquo;s case. Their browser extension integrates with more than a dozen ever-changing third party webmail interfaces. The Mailvelope team asks itself questions like, &amp;ldquo;Is time better spent improving the GMail integration or the mailbox.org one?&amp;rdquo; The answer often hinges on which providers are most popular among Mailvelope users, information not yet readily available to the Mailvelope team.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spearphishing for developers</title>
      <link>https://guardianproject.info/2022/02/23/spearphishing-for-developers/</link>
      <pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/02/23/spearphishing-for-developers/</guid>
      <description>&lt;p&gt;I received an interesting email that points to a new direction in targeting&#xA;developers to exploit them.  This email is a reply to a message that I actually&#xA;wrote to an &lt;a href=&#34;https://mail.gnu.org/archive/html/bug-gnulib/2012-01/msg00336.html&#34;&gt;email list&lt;/a&gt;&#xA;in 2012, that was posted on a public thread on a public list.  It also uses the&#xA;name of a person that posted on that thread: &amp;ldquo;Paul Eggers&amp;rdquo;.  Oddly, it did not&#xA;use that person&amp;rsquo;s actual email from the original thread.  Especially considering&#xA;that I replied to the message to ask for more info, but got no answer.  I guess&#xA;this was just to ensure that the real &amp;ldquo;Paul Eggers&amp;rdquo; did not respond.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Decentralizing Distribution</title>
      <link>https://guardianproject.info/2022/02/05/decentralizing-distribution/</link>
      <pubDate>Sat, 05 Feb 2022 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2022/02/05/decentralizing-distribution/</guid>
      <description>&lt;p&gt;Guardian Project has been awarded a grant from the &lt;a href=&#34;https://www.ffdweb.org/guardian-project-annoucement&#34;&gt;Filecoin Foundation for the Decentralized Web (FFDW)&lt;/a&gt; to work on decentralizing veracity and distribution (DVD).  FFDW’s Mission is to “ensure the permanent preservation of humanity’s most important information by stewarding the development of open source software and open protocols for decentralized data storage and retrieval networks.”  Filecoin is built on top of IPFS, which is &amp;ldquo;&lt;a href=&#34;https://docs.ipfs.io/concepts/what-is-ipfs/&#34;&gt;a distributed system for storing and accessing files&lt;/a&gt;&amp;rdquo;.  The distribution component of the FFDW-DVD project is focused on improving F-Droid&amp;rsquo;s free, open, and decentralized mobile app ecosystem.  On top of the flagship unified experience offered by this website and the F-Droid official app, F-Droid provides all the pieces for anyone to create, build, remix, publish, reproduce, redistribute and review mobile apps.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF: Year End Review 2021</title>
      <link>https://guardianproject.info/2021/12/23/ietf-year-end-review-2021/</link>
      <pubDate>Thu, 23 Dec 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/12/23/ietf-year-end-review-2021/</guid>
      <description>&lt;p&gt;In terms of potential impact on Internet Freedom, it’s been a banner year at the Internet Engineering Task Force &lt;a href=&#34;https://ietf.org/&#34;&gt;(IETF)&lt;/a&gt;.  &lt;a href=&#34;https://datatracker.ietf.org/doc/rfc9000/&#34;&gt;QUIC&lt;/a&gt; (featuring the improved privacy and security of &lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc8446&#34;&gt;TLS1.3&lt;/a&gt;) reached Proposed Standard status, with implementations and rollouts from every major vendor on both server and client, and with multiple &lt;a href=&#34;https://en.wikipedia.org/wiki/QUIC#Source_Code&#34;&gt;open source toolkit options&lt;/a&gt; for developers.  &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-tls-esni/&#34;&gt;Encrypted Client Hello&lt;/a&gt; for TLS1.3 gained traction via the &lt;a href=&#34;https://defo.ie&#34;&gt;DEfO project&lt;/a&gt; that, through pull requests, makes a huge privacy enhancement easily available to the major security library (OpenSSL) underpinning the Internet’s most important service engines (nginx, apache, lighttpd, haproxy on the server, even curl on the client).  IP address privacy got new attention with a working group formed around Oblivious HTTP Application Intermediation (&lt;a href=&#34;https://datatracker.ietf.org/doc/charter-ietf-ohai/&#34;&gt;OHAI&lt;/a&gt;), as did Privacy-Preserving Measurement (&lt;a href=&#34;https://datatracker.ietf.org/doc/bofreq-privacy-preserving-measurement/&#34;&gt;PPM&lt;/a&gt;) which seeks to drastically reduce the amount of personal information swept up in the pervasive monitoring of all public Internet activity.  Meanwhile, the Internet Research Task Force (&lt;a href=&#34;https://irtf.org&#34;&gt;IRTF&lt;/a&gt;) has focused on developing new cryptographic techniques to serve these rapidly-evolving privacy-focused activities. IRTF also fosters work on truly-global Internet access and, in a sense, serves as the IETF’s conscience through it’s work on the &lt;a href=&#34;https://datatracker.ietf.org/rg/hrpc/about/&#34;&gt;human rights implications of protocol design&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Debian over HTTPS</title>
      <link>https://guardianproject.info/2021/12/08/debian-over-https/</link>
      <pubDate>Wed, 08 Dec 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/12/08/debian-over-https/</guid>
      <description>&lt;p&gt;Debian&amp;rsquo;s package manager &lt;a href=&#34;https://wiki.debian.org/SecureApt&#34;&gt;&lt;em&gt;apt&lt;/em&gt;&lt;/a&gt; has a&#xA;time-tested method of securely providing packages from the network built on&#xA;OpenPGP signatures.  Even though this signing method works well for verifying&#xA;the indexes and package files, there are new threats that have become relevant&#xA;as man-in-the-middle attacks and data mining become ever easier.  Since 2013,&#xA;&lt;em&gt;apt&lt;/em&gt; developers have supported encrypted transport methods HTTPS and Tor Onion&#xA;Service.  We have been &lt;a href=&#34;https://guardianproject.info/2016/07/31/howto-get-all-your-debian-packages-via-tor-onion-services/&#34;&gt;recommending&lt;/a&gt; &lt;a href=&#34;https://guardianproject.info/2019/01/23/use-onions/https-for-software-updates/&#34;&gt;their&lt;/a&gt; &lt;a href=&#34;https://guardianproject.info/2014/10/16/reducing-metadata-leakage-from-software-updates/&#34;&gt;use&lt;/a&gt; since &lt;a href=&#34;https://guardianproject.info/2013/10/31/issues-when-distributing-software/&#34;&gt;2013&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Most major mirrors already support HTTPS, and now &lt;a href=&#34;https://security.debian.org&#34;&gt;https://security.debian.org&lt;/a&gt;&#xA;has finally joined the party.  That means it is possible to use HTTPS on all of&#xA;the official repositories.  On top of that, many Debian Developers are working&#xA;on making &lt;a href=&#34;https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992692&#34;&gt;HTTPS the&#xA;default&lt;/a&gt; for new&#xA;installs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Implementing TLS Encrypted Client Hello</title>
      <link>https://guardianproject.info/2021/11/30/implementing-tls-encrypted-client-hello/</link>
      <pubDate>Tue, 30 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/11/30/implementing-tls-encrypted-client-hello/</guid>
      <description>&lt;p&gt;As part of the &lt;a href=&#34;https://defo.ie/&#34;&gt;DEfO&lt;/a&gt; project, we have been working on&#xA;accelerating the development &lt;a href=&#34;https://www.ietf.org/archive/id/draft-ietf-tls-esni-13.html&#34;&gt;Encrypted Client Hello&#xA;(ECH)&lt;/a&gt; as&#xA;standardized by the IETF.  ECH is the next step in improving Transport Layer&#xA;Security (TLS).  TLS is one of the basic building blocks of the internet, it is&#xA;what puts the S in HTTPS.  The ECH standard is nearing completion.  That is&#xA;exciting because ECH can encrypt the last plaintext TLS metadata that it is&#xA;possible to encrypt.  So ECH will bring some real improvements in privacy and&#xA;censorship resistance.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcement: AnyNews 1.0: Censorship-Resistant News and Media Distribution</title>
      <link>https://guardianproject.info/2021/11/29/announcement-anynews-1.0-censorship-resistant-news-and-media-distribution/</link>
      <pubDate>Mon, 29 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/11/29/announcement-anynews-1.0-censorship-resistant-news-and-media-distribution/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;p&gt;For content publishers, AnyNews is a news distribution suite focused on service to censorship-prone geographies, easily integrated into existing content sources.  AnyNews is open-source and easily branded (or customized, if desired) without extensive effort or expense.  AnyNews integrates technologies to counter a range of censorship regimes and is designed to accommodate new technologies more easily and quickly as they arise. Tools are provided to support a range of publishing options for environments that suffer from connectivity or performance problems. Service engagements are possible when custom software is required.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IETF112 - Meeting Update (November 2021)</title>
      <link>https://guardianproject.info/2021/11/24/ietf112-meeting-update-november-2021/</link>
      <pubDate>Wed, 24 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/11/24/ietf112-meeting-update-november-2021/</guid>
      <description>&lt;p&gt;The 112th meeting of the Internet Engineering Task Force (IETF) took place November 8-12, 2021 - as a virtual event for the sixth time in succession due to the COVID-19 pandemic. Here’s a summary of the work I found important to the Internet Freedom community.&lt;/p&gt;&#xA;&lt;h2 id=&#34;privacy-preserving-measurement&#34;&gt;Privacy Preserving Measurement&lt;/h2&gt;&#xA;&lt;p&gt;While we often (rightly) focus on unwanted surveillance of targeted individuals by nation-states and other bad actors, the Internet’s surveillance economy presents a major threat to personal privacy and freedom for all users of the Internet, as Mozilla so aptly describes on &lt;a href=&#34;https://wiki.mozilla.org/State_Of_The_Internet/Surveillance_Economy&#34;&gt;this wiki page&lt;/a&gt;. Since IETF significantly boosted its focus on privacy at IETF105 (July 2019, where privacy was the &lt;a href=&#34;https://datatracker.ietf.org/meeting/105/materials/slides-105-ietf-sesse-privacy-modern-concerns-steven-m-bellovin-00&#34;&gt;plenary topic&lt;/a&gt;), participants at both research and engineering levels have begun to address this problem - initially with research studies and statements of requirements, and then with proposals.  Later we’ll discuss proposals that try to offer more anonymity in the way users access the Internet. But new at this conference was a Birds of a Feather session formed around the idea of &lt;a href=&#34;https://datatracker.ietf.org/doc/bofreq-privacy-preserving-measurement/&#34;&gt;Privacy Preserving Measurement&lt;/a&gt; (PPM) and led by Mozilla’s Eric Rescorla who has collected significant thoughts and technical ideas &lt;a href=&#34;https://educatedguesswork.org/tags/privacy%20preserving%20measurement/&#34;&gt;here&lt;/a&gt;.  This thinking would insert a layer of protection between end users and the data collection infrastructure in a way that would significantly impact the bad (for privacy) practices of current-term measurement tools - over-collection, under-protection and deep-interlinking.  An architecture for PPM was proposed and, as there was significant interest from IETF attendees, a Working Group is being established to undertake the technical effort.  There is a future work effort here to understand how this work overlaps or dove-tails with &lt;a href=&#34;https://cleaninsights.org&#34;&gt;CleanInsights&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The IETF and Internet Freedom</title>
      <link>https://guardianproject.info/2021/10/18/the-ietf-and-internet-freedom/</link>
      <pubDate>Mon, 18 Oct 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/10/18/the-ietf-and-internet-freedom/</guid>
      <description>&lt;p&gt;It seems useful to clarify the relationship between the near-term work of keeping the Internet open on a daily basis - work that dominates the efforts of the Internet Freedom community - and the long term work of the industry on crafting operational standards for the same network.&lt;/p&gt;&#xA;&lt;p&gt;Those involved in Internet Freedom are typically focused on the “problems of today”, creating solutions using existing technologies offering immediate effect.  Often, it’s hard to tell if Internet standards are helping, hurting, or just in the way.  However, looking back at the (roughly) 15-year history of Internet Freedom work, it’s useful to recognize the many times we’ve said to ourselves “&lt;em&gt;Gosh, I would have done that differently if I’d had a chance to think about it&lt;/em&gt;”.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New insights into clean analytics</title>
      <link>https://guardianproject.info/2021/03/02/new-insights-into-clean-analytics/</link>
      <pubDate>Tue, 02 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/03/02/new-insights-into-clean-analytics/</guid>
      <description>&lt;p&gt;There is a giant problem with the &amp;ldquo;collect it all&amp;rdquo; status quo that pervades on the Internet, this has been clear for a long time.  Tracking people has become so &lt;a href=&#34;https://www.ghostery.com/study/&#34;&gt;widespread&lt;/a&gt; that &lt;a href=&#34;https://noyb.eu&#34;&gt;organizations&lt;/a&gt;, &lt;a href=&#34;https://f-droid.org&#34;&gt;communities&lt;/a&gt;, &lt;a href=&#34;https://exodus-privacy.eu.org&#34;&gt;projects&lt;/a&gt; and &lt;a href=&#34;https://privacylab.yale.edu/&#34;&gt;university&lt;/a&gt; &lt;a href=&#34;https://privacylab.at&#34;&gt;labs&lt;/a&gt; have sprung up dedicated to detecting and publicizing their presence.  Data and analytics are clearly useful for software creators and funders, but they also easily lead to harming people&amp;rsquo;s privacy and well-being.  The past year of work on Clean Insights has clarified our goals to make analytics possible without injuring the very people we aim to serve.  Clean Insights takes the world of data analytics and turns it on its head.   The Clean Insights approach starts with thinking about the data, then choosing only the data that is clearly safe to use.  A user&amp;rsquo;s location, complete device description, or other identifying information is dangerous to gather.  A simple count of how many times a feature was used, or a webpage was visited, can be gathered without links to people.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Usability: the wonderful, powerful idea that betrayed us</title>
      <link>https://guardianproject.info/2021/02/18/usability-the-wonderful-powerful-idea-that-betrayed-us/</link>
      <pubDate>Thu, 18 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/02/18/usability-the-wonderful-powerful-idea-that-betrayed-us/</guid>
      <description>&lt;p&gt;Usability triggered a revolution in computing, taking arcane number crunching machines and making them essential tools in so many human endeavors, even those that have little to do with mathematics.  It turned the traditional design approach on its head.  Initially, experts first built a system then trained users to follow it. User experience design starts with goals, observes how people actually think and act in the relevant context, then designs around those observations, and tests with users to ensure it fits the users&amp;rsquo; understanding.  These ideas were pioneered in the Silicon Valley. This was driven by the unusual confluence of a pioneering spirit and deep engineering skills. That merged with a strong &lt;a href=&#34;https://en.wikipedia.org/wiki/Midpeninsula_Free_University&#34;&gt;counter&lt;/a&gt;-&lt;a href=&#34;https://en.wikipedia.org/wiki/Homebrew_Computer_Club&#34;&gt;culture&lt;/a&gt; looking to &lt;a href=&#34;https://en.wikipedia.org/wiki/People%27s_Computer_Company&#34;&gt;empower&lt;/a&gt; individuals and communities. So much of the best of digital technology has its roots in these ideas.  I feel fortunate to have grown up immersed in these ideas in the Silicon Valley of the 70s and 80s, and still feel that sense of idealism that these ideas can truly make the world a better place.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Clean Insights: February 2021 Update on Privacy-Preserving Measurement</title>
      <link>https://guardianproject.info/2021/02/10/clean-insights-february-2021-update-on-privacy-preserving-measurement/</link>
      <pubDate>Wed, 10 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2021/02/10/clean-insights-february-2021-update-on-privacy-preserving-measurement/</guid>
      <description>&lt;p&gt;Greetings, all. I hope this finds you healthy and well, finding ways to enjoy the season (whichever it may be). While everyday still provides new challenges in the life of our team at Guardian Project, we continue to strive to be productive as productive as we can be in our professional and personal lives.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve just posted an updated presentation on &lt;a href=&#34;https://cleaninsights.org&#34;&gt;Clean Insights&lt;/a&gt;, reflecting on the symposium in May, and the work we have done since then. You can see and share it from here:&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Data Sources: API Key Identifiers and BroadcastReceiver Declarations</title>
      <link>https://guardianproject.info/2020/12/15/new-data-sources-api-key-identifiers-and-broadcastreceiver-declarations/</link>
      <pubDate>Tue, 15 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/12/15/new-data-sources-api-key-identifiers-and-broadcastreceiver-declarations/</guid>
      <description>&lt;p&gt;A central focus of the &lt;a href=&#34;https://gitlab.com/trackingthetrackers/wiki&#34;&gt;Tracking the&#xA;Trackers&lt;/a&gt; project has&#xA;been to find simple ways to detect whether a given Android APK app&#xA;file contains code which tracks the user.  The ideal scenario is a&#xA;simple program that can scan the APK and tell a non-technical user&#xA;whether it contains trackers, but as decades of experience with&#xA;anti-virus and malware scanners have clearly demonstrated, scanners&#xA;will always contain a large degree of approximation and guesswork.&#xA;Tracking the Trackers grew out of experiments in using machine&#xA;learning to detect malware.  This provided the spark to apply this to&#xA;privacy issues.&lt;/p&gt;</description>
    </item>
    <item>
      <title>εxodus ETIP: The Canonical Database for Tracking Trackers</title>
      <link>https://guardianproject.info/2020/12/11/%CE%B5xodus-etip-the-canonical-database-for-tracking-trackers/</link>
      <pubDate>Fri, 11 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/12/11/%CE%B5xodus-etip-the-canonical-database-for-tracking-trackers/</guid>
      <description>&lt;p&gt;There is a new story to add to the list of horrors of &lt;a href=&#34;https://en.wikipedia.org/wiki/Surveillance_capitalism&#34;&gt;Surveillance Capitalism&lt;/a&gt;: the United States&amp;rsquo; Military is &lt;a href=&#34;https://www.vice.com/en/article/jgqm5x/us-military-location-data-xmode-locate-x&#34;&gt;purchasing tracking and location data&lt;/a&gt; from companies that track many millions of people.  We believe the best solution starts with making people aware of the problem, with tools like &lt;a href=&#34;https://exodus-privacy.eu.org/&#34;&gt;Exodus Privacy&lt;/a&gt;.  Then they must have real options for stepping out of &amp;ldquo;big tech&amp;rdquo;, &lt;a href=&#34;https://www.theguardian.com/technology/2017/nov/28/android-apps-third-party-tracker-google-privacy-security-yale-university&#34;&gt;where tracking dominates&lt;/a&gt;.  &lt;a href=&#34;https://f-droid.org&#34;&gt;F-Droid&lt;/a&gt; provides Android apps that are reviewed for tracking and other &lt;a href=&#34;https://f-droid.org/en/docs/Anti-Features/&#34;&gt;&amp;ldquo;anti-features&amp;rdquo;&lt;/a&gt;, and F-Droid is built into mobile platforms like &lt;a href=&#34;https://calyxos.org/&#34;&gt;CalyxOS&lt;/a&gt; that are free of proprietary, big tech software.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Distribution in Depth: Mirrors as a Source of Resiliency</title>
      <link>https://guardianproject.info/2020/12/07/distribution-in-depth-mirrors-as-a-source-of-resiliency/</link>
      <pubDate>Mon, 07 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/12/07/distribution-in-depth-mirrors-as-a-source-of-resiliency/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;distribution.png&#34; alt=&#34;distribution&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;There are many ways to get the apps and media, even when the Internet is expensive, slow, blocked, or even completely unavailable.  Censorshop circumvention tools from ShadowSocks to Pluggable Transports can evade blocks.  Sneakernets and &lt;a href=&#34;https://briarproject.org/how-it-works/&#34;&gt;nearby connections&lt;/a&gt; work without any network connection.   Hosting on Content Delivery Networks (CDNs) can make hosting drastically cheaper and faster.  One method that is often overlooked these days is repository mirrors.  Distribution setups that support mirrors give users the flexibility to find a huge array of solutions for problems when things are not just working.  Mirrors on local networks can be much cheaper. Mirrors in specific countries are often not blocked or filtered.  Mirrors can be copied onto portable storage and moved to where the users are.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Managing offline maps with F-Droid and OsmAnd</title>
      <link>https://guardianproject.info/2020/11/28/managing-offline-maps-with-f-droid-and-osmand/</link>
      <pubDate>Sat, 28 Nov 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/11/28/managing-offline-maps-with-f-droid-and-osmand/</guid>
      <description>&lt;p&gt;When disaster strikes, our mobile devices can provide us with many&#xA;tools to deal with a wide variety of problems.  The internet is not&#xA;available in every corner of the planet, and large scale outages&#xA;happen.  Digital maps allow us to carry detailed maps of the entire&#xA;planet in our pockets.  And the good map apps allow the user to&#xA;download entire regions to the device so that they operate without&#xA;internet at all.  Unfortunately, the big map apps from Google and&#xA;Apple provide limited offline capabilities.  For example, it is&#xA;&lt;a href=&#34;https://annoyingtechnicaldetails.wordpress.com/2020/09/23/cannot-easily-redistribute-downloaded-offline-files-for-google-maps/&#34;&gt;not possible&lt;/a&gt;&#xA;to share offline data from one device to another.  Online maps are&#xA;also a major privacy leak, since location data is the most sensitive&#xA;data.  With online maps, the service operator sees each tile of the&#xA;map that you look at, each time you look at it, as well as all the&#xA;locations you search for.&lt;/p&gt;</description>
    </item>
    <item>
      <title></title>
      <link>https://guardianproject.info/2020/06/08/</link>
      <pubDate>Mon, 08 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/06/08/</guid>
      <description>&lt;p&gt;In 2010, at the Open Video Conference hackathon, I came up with a concept called &lt;a href=&#34;https://blog.witness.org/2010/10/ovc2010-opensubtitles/&#34;&gt;&amp;ldquo;auto blur the news&amp;rdquo;&lt;/a&gt;, while in a brainstorm with activists, advocates and coders, including Sam Gregory, a longtime ally from &lt;a href=&#34;https://witness.org&#34;&gt;WITNESS&lt;/a&gt;. Using the built-in face recognition features on modern smartphones, you could instantly redact faces from a photo or video, instead of tagging or tracking those same faces. Out of this came an app called &lt;a href=&#34;https://play.google.com/store/apps/details?id=org.witness.sscphase1&amp;amp;feature=search_result&#34;&gt;ObscuraCam&lt;/a&gt;, which was always meant as a proof of concept demonstration to help lobby mainstream apps and operating systems a simple feature available for all.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Easy translation workflows and the risks of translating in the cloud</title>
      <link>https://guardianproject.info/2020/06/08/easy-translation-workflows-and-the-risks-of-translating-in-the-cloud/</link>
      <pubDate>Mon, 08 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/06/08/easy-translation-workflows-and-the-risks-of-translating-in-the-cloud/</guid>
      <description>&lt;p&gt;Crowdsourced translation has opened up software and websites to whole&#xA;new languages, regions, and uses.  Making translating easier has&#xA;brought in more contributors, and deploying those languages requires&#xA;less work.  A number of providers now offer &amp;ldquo;live&amp;rdquo;, integrated&#xA;translation, speeding up the process of delivering translated&#xA;websites. On the surface, this looks like a big win.  Unfortunately,&#xA;the way such services have been implemented opens up a big can of&#xA;worms.  Third parties must be trusted with user data.  The translators&#xA;cannot work without being tracked. Displaying the translation requires&#xA;JavaScript.  The security profile is more complicated and harder to&#xA;defend.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Onion Browser Release 2.6 Tutorial</title>
      <link>https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/</link>
      <pubDate>Tue, 02 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/</guid>
      <description>&lt;p&gt;In this tutorial we&amp;rsquo;re going to talk about the best practices to browse the web securely on iOS using &lt;a href=&#34;https://onionbrowser.com&#34;&gt;Onion Browser&lt;/a&gt; Release 2.6 and the &lt;a href=&#34;https://torproject.org&#34;&gt;Tor network&lt;/a&gt;. &lt;a href=&#34;https://onionbrowser.com&#34;&gt;Onion Browser for iOS&lt;/a&gt; is a free, open-source web browser app developed originally by &lt;a href=&#34;https://mike.tig.as/&#34;&gt;Mike Tigas&lt;/a&gt;, with Release 2.6 as a collaboration with the Guardian Project. Onion Browser has Tor built-in and uses Tor to protect your web activity.&lt;/p&gt;&#xA;&lt;p&gt;You can also watch the &lt;a href=&#34;https://www.youtube.com/playlist?list=PL4-CVUWabKWeHeBpadBLjzlWVa7binXpj&#34;&gt;Onion Browser Video Tutorial&lt;/a&gt; on YouTube.&lt;/p&gt;</description>
    </item>
    <item>
      <title>On the classification of tracking</title>
      <link>https://guardianproject.info/2020/05/20/on-the-classification-of-tracking/</link>
      <pubDate>Wed, 20 May 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/05/20/on-the-classification-of-tracking/</guid>
      <description>&lt;p&gt;This position paper tries to outline a framework for defining trackers&#xA;in smart phones and lists mechanisms for identifying them.  It hopes&#xA;to serve as the foundation for the work done in the&#xA;Tracking-the-Trackers project.&lt;/p&gt;&#xA;&lt;p&gt;In &lt;a href=&#34;#section-1-levels-of-unwanted-behaviour&#34;&gt;section 1&lt;/a&gt; we start with&#xA;an abstract analysis of levels of unwanted behaviour in the context of&#xA;tracking.&lt;/p&gt;&#xA;&lt;p&gt;Next, in &lt;a href=&#34;#section-2-an-attacker-s-perspective-and-a-taxonomy&#34;&gt;section&#xA;2&lt;/a&gt;, we focus on&#xA;an attacker’s perspective, on anonymity and pseudonymity. This&#xA;foundation allows us to define terms which are needed throughout the&#xA;paper.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Free Software Tooling for Android Feature Extraction</title>
      <link>https://guardianproject.info/2020/05/06/free-software-tooling-for-android-feature-extraction/</link>
      <pubDate>Wed, 06 May 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/05/06/free-software-tooling-for-android-feature-extraction/</guid>
      <description>&lt;p&gt;As part of the Tracking the Trackers project, we are inspecting&#xA;thousands of Android apps to see what kinds of tracking we can find.&#xA;We are looking at both the binary APK files as well as the source&#xA;code.  Source code is of course easy to inspect, since it is already a&#xA;form that is meant to be read and reviewed by people.  Android APK&#xA;binaries are a very different story.  They are first and foremost a&#xA;machine-executable format.  On top of that, many developers&#xA;deliberately obfuscate as much as possible in the APK to resist&#xA;inspection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;Features&#34; for Finding Trackers</title>
      <link>https://guardianproject.info/2020/04/28/features-for-finding-trackers/</link>
      <pubDate>Tue, 28 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/04/28/features-for-finding-trackers/</guid>
      <description>&lt;p&gt;One key component of the Tracking the Trackers project is building a&#xA;machine learning (ML) tool to aide humans to find tracking in Android&#xA;apps. One of the most important pieces of developing a machine&#xA;learning tool is figuring out which &amp;ldquo;features&amp;rdquo; should be fed to the&#xA;machine learning algorithms. In this context, features are&#xA;constrained data sets derived from the whole data set. In our case,&#xA;the whole data set is terabytes of APKs. This post is an outline of&#xA;the features that we are focusing on in this current project.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Figuring Out Crowdsourced Translation of Websites</title>
      <link>https://guardianproject.info/2020/04/23/figuring-out-crowdsourced-translation-of-websites/</link>
      <pubDate>Thu, 23 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/04/23/figuring-out-crowdsourced-translation-of-websites/</guid>
      <description>&lt;p&gt;Crowdsourced translation platforms like &lt;a href=&#34;https://weblate.org/&#34;&gt;Weblate&lt;/a&gt;, Transifex, Crowdin, etc. have proven to be a hugely productive way to actively translate apps and desktop software.  Long form texts like documentation and websites remain much more work to translate and keep translated.  Many translation services currently support Markdown and HTML, but very basically, which means much more work for translators and webmasters.  Translators can inadvertently break things, either with a typo or because of a lack of knowledge of a specific syntax.  This can make the whole page layout break.  Webmasters and documentation maintainers must carefully check the process to ensure everything is working smoothly.  With the spread of Markdown as a standard format, there is now hope!  Software developers can focus efforts on the Markdown translation workflow, and Markdown is more tolerant of syntax errors than HTML.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Promise and Hazards of COVID Contact Tracing Apps</title>
      <link>https://guardianproject.info/2020/04/09/the-promise-and-hazards-of-covid-contact-tracing-apps/</link>
      <pubDate>Thu, 09 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/04/09/the-promise-and-hazards-of-covid-contact-tracing-apps/</guid>
      <description>&lt;p&gt;There has been increasing interest in the possibilities of tracking&#xA;people who are infected with Coronavirus using all of the various&#xA;methods that smart phones provide.  There is good reason: &amp;ldquo;&lt;a href=&#34;https://en.wikipedia.org/wiki/Contact_tracing&#34;&gt;contact&#xA;tracing&lt;/a&gt;&amp;rdquo; has been a&#xA;pillar of public health efforts for decades.  It is an effective means&#xA;to curtail the spread of infectious disease.  At the same time,&#xA;governments, companies, and organizations are acting fast to offer&#xA;services to help end this current pandemic.  The problem is that many&#xA;of these are taking advantage of these times to introduce more&#xA;tracking of people, more data collection, and more control over&#xA;people.  We must not let contact tracing be used to reduce privacy&#xA;and increase unnecessary data collection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>We Support the Open COVID Pledge</title>
      <link>https://guardianproject.info/2020/04/09/we-support-the-open-covid-pledge/</link>
      <pubDate>Thu, 09 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/04/09/we-support-the-open-covid-pledge/</guid>
      <description>&lt;p&gt;Please join this &lt;a href=&#34;https://opencovidpledge.org&#34;&gt;Open COVID Pledge&lt;/a&gt; by&#xA;committing to freely share technology for all work that aims to end&#xA;the Coronavirus Disease 2019 (COVID-19) pandemic.&lt;/p&gt;&#xA;&lt;p&gt;We believe that free software licenses like the GNU GPL and the Apache&#xA;License already provide these key benefits.  We are making this&#xA;statement to make it clear that all of our code is available for any&#xA;effort to end the COVID Pandemic.&lt;/p&gt;&#xA;&lt;p&gt;We grant to every person and entity that wishes to accept it, a&#xA;non-exclusive, royalty-free, worldwide, fully paid-up license to fully&#xA;use, practice and exploit all our patent and copyright rights, for the&#xA;sole purpose of ending the COVID-19 pandemic and minimising the impact&#xA;of the disease, including diagnosis, prevention, containment, and&#xA;treatment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Improving Crowdsourced Translation of Long Form Text</title>
      <link>https://guardianproject.info/2020/03/05/improving-crowdsourced-translation-of-long-form-text/</link>
      <pubDate>Thu, 05 Mar 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/03/05/improving-crowdsourced-translation-of-long-form-text/</guid>
      <description>&lt;p&gt;We are happy to announce the start of work on another step in&#xA;improving crowdsourced localization, funded by the ISC Project.  This&#xA;is the second part of our ongoing &amp;ldquo;Linguine&amp;rdquo; collaboration to move&#xA;crowdsourced translation to privacy-respecting free software.&lt;/p&gt;&#xA;&lt;p&gt;Crowdsourced translation has proven enormously successful getting apps&#xA;and website software translated into many languages.  Using tools like&#xA;Weblate or Transifex, developers can quite easily incorporate&#xA;translated app strings into their mobile apps and websites.  Any kinds&#xA;of text that is easily broken down into phrases and sentences will fit&#xA;easily into the crowdsourced workflow.  Localization Lab enables a&#xA;wide range of volunteers to contribute to the most important projects&#xA;in a wide array of languages.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MASQUE Review</title>
      <link>https://guardianproject.info/2020/02/25/masque-review/</link>
      <pubDate>Tue, 25 Feb 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/02/25/masque-review/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://datatracker.ietf.org/wg/masque/about/&#34;&gt;MASQUE&lt;/a&gt; is set of related IETF drafts for specifying flexible proxying built into a standard webserver.  It is meant to be deployed on a server that is serving public websites, then this connection can be reused for proxying generic connections.  It is very much a work in progress, so any of this can change.  It is currently built on top of the QUIC+HTTP/3 and HTTP/2+TLS+TCP protocols.  The website and proxy packets look the same, and all connections to the webserver will be shared and reused, regardless of whether its a web page request or proxy traffic.  Each new proxy/website request will reuse any existing connection, providing a key reduction in metadata that makes all the packets blend together from the point of view of the network observer.  For example, to prevent the network observer from corrolating requests to proxy with the outbound request to the destination, a client could first connect to the website, then some time later, connect to the proxy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tracking the Trackers: using machine learning to aid ethical decisions</title>
      <link>https://guardianproject.info/2020/01/16/tracking-the-trackers-using-machine-learning-to-aid-ethical-decisions/</link>
      <pubDate>Thu, 16 Jan 2020 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2020/01/16/tracking-the-trackers-using-machine-learning-to-aid-ethical-decisions/</guid>
      <description>&lt;p&gt;F-Droid is a free software community app store that has been working since 2010 to make all forms of tracking and advertising visible to users. It has become the trusted name for privacy in Android, and app developers who sell based on privacy make the extra effort to get their apps included in the F-Droid.org collection. These include &lt;a href=&#34;https://f-droid.org/packages/com.nextcloud.client&#34;&gt;Nextcloud&lt;/a&gt;, Tor Browser, &lt;a href=&#34;https://f-droid.org/packages/de.thecode.android.tazreader&#34;&gt;TAZ.de&lt;/a&gt;, and &lt;a href=&#34;https://f-droid.org/packages/de.tutao.tutanota&#34;&gt;Tutanota&lt;/a&gt;.  Auditing apps for tracking is labor intensive and error prone, yet ever more in demand. F-Droid already has tools to aide contributors in this process, visible in the &lt;a href=&#34;https://gitlab.com/fdroid/fdroiddata/merge_requests&#34;&gt;app submission&lt;/a&gt; and &lt;a href=&#34;https://gitlab.com/fdroid/rfp/issues&#34;&gt;Request For Packaging (RFP)&lt;/a&gt; issue trackers.  We also have functional prototypes of using machine learning to drastically speed up this process by augmenting humans, rather than replacing them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NetCipher &#43; Conscrypt for the best possible TLS</title>
      <link>https://guardianproject.info/2019/12/17/netcipher--conscrypt-for-the-best-possible-tls/</link>
      <pubDate>Tue, 17 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/12/17/netcipher--conscrypt-for-the-best-possible-tls/</guid>
      <description>&lt;p&gt;A new NetCipher library has recently been merged:&#xA;&lt;a href=&#34;https://gitlab.com/guardianproject/NetCipher/merge_requests/86&#34;&gt;&lt;em&gt;netcipher-conscrypt&lt;/em&gt;&lt;/a&gt;.&#xA;In the same vein as the other NetCipher libraries,&#xA;&lt;em&gt;netcipher-conscrypt&lt;/em&gt; wraps the Google&#xA;&lt;a href=&#34;https://source.android.com/devices/architecture/modular-system/conscrypt&#34;&gt;Conscrypt&lt;/a&gt;&#xA;library, which provides the latest&#xA;&lt;a href=&#34;https://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;TLS&lt;/a&gt; for any&#xA;app that includes it.  &lt;em&gt;netcipher-conscrypt&lt;/em&gt; lets apps then disable old&#xA;TLS versions like TLSv1.0 and TLSv1.1, as well as disable TLS Session&#xA;Tickets.  This is an alpha release because it only works on recent&#xA;Android versions (8.1 or newer).  The actual functionality works well,&#xA;the hard part remains making sure that it is possible to inject&#xA;&lt;em&gt;netcipher-conscrypt&lt;/em&gt; as the TLS provider on all Android devices and&#xA;versions.  And the last missing piece is finding the right place in&#xA;Conscrypt to configure proxying to support Tor or other privacy&#xA;proxies&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trusted Update Channels vs. Scratching Your Itch</title>
      <link>https://guardianproject.info/2019/12/02/trusted-update-channels-vs.-scratching-your-itch/</link>
      <pubDate>Mon, 02 Dec 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/12/02/trusted-update-channels-vs.-scratching-your-itch/</guid>
      <description>&lt;p&gt;One of the great things about free software is that people can easily take a functional program or library and customize it as they see fit.  Anyone can come along, submit bug fixes or improvements, and they can be easily shared across many people, projects, and organizations.  With distribution systems like Python&amp;rsquo;s &lt;a href=&#34;https://pypi.python.org&#34;&gt;pypi&lt;/a&gt;, there is an update channel that the trusted maintainers can publish fixes so consumers of the library can easily get updates.  When talking about update channels and code, it is unavoidable to also talk about people and trust.  One key piece is the trust relationship between the consumer and the maintainer.  The ideal software distribution system would be a blind, trustworthy pipe between the software maintainers and each end user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Onions on Apples: A New Release of Onion Browser for iOS</title>
      <link>https://guardianproject.info/2019/10/08/onions-on-apples-a-new-release-of-onion-browser-for-ios/</link>
      <pubDate>Tue, 08 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/10/08/onions-on-apples-a-new-release-of-onion-browser-for-ios/</guid>
      <description>&lt;p&gt;During 2019, Guardian Project has been working with developer Mike Tigas to make improvements to his Tor-enabled web browser for iOS, &lt;a href=&#34;https://onionbrowser.com/&#34;&gt;Onion Browser&lt;/a&gt;.  Here we re-cap the major improvements currently - and soon-to-be - available.&lt;/p&gt;&#xA;&lt;p&gt;Mike developed Onion Browser on his own, in close collaboration with the Tor Project.  Though we’ve worked with Mike in the recent-past, this 2019 project &amp;ndash; funded by the Open Technology Fund &amp;ndash; gave us significantly more bandwidth to address the challenges of running Tor on iOS, especially alongside a full web-browsing feature set.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IOCipher 64-bit builds</title>
      <link>https://guardianproject.info/2019/10/07/iocipher-64-bit-builds/</link>
      <pubDate>Mon, 07 Oct 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/10/07/iocipher-64-bit-builds/</guid>
      <description>&lt;p&gt;IOCipher v0.5 includes fulil 64-bit support and works with the latest&#xA;SQLCipher versions.  This means that the minimum supported SDK version&#xA;had to be bumped to &lt;em&gt;android-14&lt;/em&gt;, which is still older than what&#xA;Google Play Services and Android Support libraries require.&lt;/p&gt;&#xA;&lt;p&gt;One important thing to note is that newer SQLCipher versions require&#xA;an upgrade procedure since they changed how the data is encrypted.&#xA;Since IOCipher does use a SQLCipher database, and IOCipher virtual&#xA;disks will have to be upgraded.  That can be done by directly using the&#xA;&lt;a href=&#34;https://www.zetetic.net/sqlcipher/sqlcipher-api/#cipher_migrate&#34;&gt;SQLCipher migration method&lt;/a&gt;&#xA;on your IOCipher database files before opening them again.  It should&#xA;be possible to stick with SQLCipher&#xA;&lt;a href=&#34;https://github.com/sqlcipher/android-database-sqlcipher/issues/446&#34;&gt;v3.5.9 to avoid this&lt;/a&gt;,&#xA;but this has not been tested.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tor Project: Orfox Paved the Way for Tor Browser on Android </title>
      <link>https://guardianproject.info/2019/09/03/tor-project-orfox-paved-the-way-for-tor-browser-on-android/</link>
      <pubDate>Tue, 03 Sep 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/09/03/tor-project-orfox-paved-the-way-for-tor-browser-on-android/</guid>
      <description>&lt;p&gt;Last month, we tagged the &lt;a href=&#34;https://github.com/guardianproject/Orfox/releases/tag/Orfox-Final-RIP-v16&#34;&gt;final release of Orfox&lt;/a&gt;, an important milestone for us in our work on Tor. Today, we pushed this final build out to all the Orfox users on Google Play, which forces them to upgrade to the official Tor Browser for Android..&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;orfoxrip.png&#34; alt=&#34;Orfox RIP app image&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Our goal was never to become the primary developer or maintainer of the &amp;ldquo;best&amp;rdquo; tor-enabled web browser app on Android. Instead, we chose to act as a catalyst to get the Tor Project and the Tor Browser development team themselves to take on Android development, and upstream our work into the primary codebase. This has happened, and it is a great news for everyone. The work for developing and updating Tor Browser on the desktop and Android are now coordinated and synchronized, and end-users benefit from more frequent updates and improvements.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NetCipher update: global, SOCKS, and TLSv1.2</title>
      <link>https://guardianproject.info/2019/06/25/netcipher-update-global-socks-and-tlsv1.2/</link>
      <pubDate>Tue, 25 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/06/25/netcipher-update-global-socks-and-tlsv1.2/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/code/netcipher&#34;&gt;NetCipher&lt;/a&gt; has been relatively quiet in recent years, because it kept&#xA;on working, doing it was doing. Now, we have had some recent&#xA;discoveries about the guts of Android that mean NetCipher is a lot easier&#xA;to use on recent Android versions.  On top of that, TLSv1.2 now reigns&#xA;supreme and is basically everywhere, so it is time to turn TLSv1.0 and&#xA;TLSv1.1 entirely off.&lt;/p&gt;&#xA;&lt;h2 id=&#34;a-single-method-to-enable-proxying-for-the-whole-app&#34;&gt;A single method to enable proxying for the whole app&lt;/h2&gt;&#xA;&lt;p&gt;As of Android 8.0 (26 aka Oreo), it is now possible to set a&#xA;&lt;code&gt;URLStreamHandlerFactory&lt;/code&gt;, which creates &lt;code&gt;URLConnection&lt;/code&gt; instances&#xA;with custom configurations.  If an app is using the built-in&#xA;&lt;code&gt;HttpURLConnection&lt;/code&gt; API for its networking, it is now possible to&#xA;enable global proxying with a single method call when the app starts:&#xA;&lt;a href=&#34;https://guardianproject.github.io/NetCipher/libnetcipher/info/guardianproject/netcipher/NetCipher.html#useGlobalProxy--&#34;&gt;&lt;code&gt;NetCipher.useGlobalProxy()&lt;/code&gt;&lt;/a&gt;.&#xA;Then the actual proxy configuration can be set dynamically, using&#xA;things like&#xA;&lt;a href=&#34;https://guardianproject.github.io/NetCipher/libnetcipher/info/guardianproject/netcipher/NetCipher.html#useTor--&#34;&gt;&lt;code&gt;NetCipher.useTor()&lt;/code&gt;&lt;/a&gt;&#xA;or&#xA;&lt;a href=&#34;https://guardianproject.github.io/NetCipher/libnetcipher/info/guardianproject/netcipher/NetCipher.html#clearProxy--&#34;&gt;&lt;code&gt;NetCipher.clearProxy()&lt;/code&gt;&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>PanicKit 1.0: built-in panic button and full app wipes</title>
      <link>https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/</link>
      <pubDate>Tue, 04 Jun 2019 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/</guid>
      <description>&lt;p&gt;Panic Kit is 1.0!  After over three years of use, it is time to call&#xA;this stable and ready for widespread use.&lt;/p&gt;&#xA;&lt;link rel=&#34;stylesheet&#34; href=&#34;https://guardianproject.info//css/jquery.fancybox-3.4.0.min.css&#34; /&gt;&#xA;&lt;script src=&#34;https://guardianproject.info//js/jquery-3.3.1.min.js&#34;&gt;&lt;/script&gt;&#xA;&lt;script src=&#34;https://guardianproject.info//js/jquery.fancybox.min.js&#34;&gt;&lt;/script&gt;&#xA;&lt;div class=&#34;gallery&#34;&gt;&#xA;  &#xA;  &#xA;  &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/Screenshot_1559551039.png&#34;&gt;&#xA;    &lt;img src=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/Screenshot_1559551039.png&#34;&gt;  &lt;br/&gt;&#xA;  &lt;/a&gt;&#xA;  &#xA;  &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/Screenshot_1559551407.png&#34;&gt;&#xA;    &lt;img src=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/Screenshot_1559551407.png&#34;&gt;  &lt;br/&gt;&#xA;  &lt;/a&gt;&#xA;  &#xA;  &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_fdroid_destructive0.png&#34;&gt;&#xA;    &lt;img src=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_fdroid_destructive0.png&#34;&gt;  &lt;br/&gt;&#xA;  &lt;/a&gt;&#xA;  &#xA;  &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_fdroid_destructive1.png.png&#34;&gt;&#xA;    &lt;img src=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_fdroid_destructive1.png.png&#34;&gt;  &lt;br/&gt;&#xA;  &lt;/a&gt;&#xA;  &#xA;  &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_ripple.png&#34;&gt;&#xA;    &lt;img src=&#34;https://guardianproject.info/2019/06/04/panickit-1.0-built-in-panic-button-and-full-app-wipes/screenshot_ripple.png&#34;&gt;  &lt;br/&gt;&#xA;  &lt;/a&gt;&#xA;  &#xA;  &#xA;&lt;/div&gt;&#xA;&#xA;&lt;h2 id=&#34;built-in-panic-button&#34;&gt;Built-in panic button&lt;/h2&gt;&#xA;&lt;p&gt;This round of work includes a new prototype for embedding PanicKit&#xA;directly into Android.  Android 9.0 Pie introduced a new &amp;ldquo;lockdown&amp;rdquo;&#xA;mode which follows some of the patterns laid out by PanicKit.  There&#xA;is an &lt;em&gt;Enter lockdown&lt;/em&gt; button available on the power button menu, so&#xA;it is rapidly available.  This is a great panic trigger button, so we&#xA;made a prototype of a System Settings app that lets users connect the&#xA;full flexibility of PanicKit responses to this &lt;em&gt;Enter lockdown&lt;/em&gt;&#xA;button.  The functionality that Google links to this new button is&#xA;extremely limited, it seems to be a &lt;a href=&#34;https://www.androidpolice.com/2018/03/08/android-p-feature-spotlight-new-lockdown-option-power-menu-turns-off-fingerprint-unlocking-something-called-extended-access/&#34;&gt;one time restriction on how you&#xA;login&lt;/a&gt;.&#xA;The PanicKit responses are in addition to what Google&#xA;included. CalyxOS is&#xA;&lt;a href=&#34;https://gitlab.com/calyxos/calyxos/issues/72&#34;&gt;working&lt;/a&gt; to integrate&#xA;this, look for test releases soon!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploring possibilities of Pluggable Transports on Android</title>
      <link>https://guardianproject.info/2019/04/16/exploring-possibilities-of-pluggable-transports-on-android/</link>
      <pubDate>Tue, 16 Apr 2019 15:00:00 -0400</pubDate>
      <guid>https://guardianproject.info/2019/04/16/exploring-possibilities-of-pluggable-transports-on-android/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.pluggabletransports.info&#34;&gt;Pluggable Transports&lt;/a&gt; (PT) give software developers the means&#xA;to establishing reliable connections in &lt;a href=&#34;https://en.wikipedia.org/wiki/Deep_packet_inspection&#34;&gt;DPI-filtered&lt;/a&gt; network scenarios.&#xA;A variety of techniques are supported, all available by implementing just one&#xA;standard.  We looked into how this can be put to work in Android Apps.&#xA;Hence we crafted 3 fully functional&#xA;&lt;a href=&#34;https://gitlab.com/uniqx/anynews-android#anynews-pt&#34;&gt;PT-enabled&lt;/a&gt;&#xA;&lt;a href=&#34;https://gitlab.com/uniqx/fdroidclient-pt#f-droid-pt&#34;&gt;prototype&lt;/a&gt;&#xA;&lt;a href=&#34;https://gitlab.com/uniqx/apps-android-wikipedia-pt#wikipedia-android-pt&#34;&gt;Apps&lt;/a&gt;&#xA;based on well known open source projects.&lt;/p&gt;&#xA;&lt;p&gt;All our prototypes rely on &lt;a href=&#34;https://github.com/Yawning/obfs4&#34;&gt;obfs4&lt;/a&gt; which is a stable&#xA;PT implementation widely deployed by Tor.  Guardian Project published&#xA;a library called &lt;a href=&#34;https://github.com/guardianproject/AndroidPluggableTransports&#34;&gt;AndroidPluggableTransports&lt;/a&gt; for giving Android&#xA;developers access easy access to PT.  Since we could not find any easily&#xA;accessible sample code, we created a &lt;a href=&#34;https://gitlab.com/uniqx/pt-obfs4proxy-minimal-demo&#34;&gt;minimal demo project&lt;/a&gt;,&#xA;illustrating a minimal setup for sending a HTTP-request through a OBFS4&#xA;connection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Use Onions/HTTPS for software updates</title>
      <link>https://guardianproject.info/2019/01/23/use-onions/https-for-software-updates/</link>
      <pubDate>Wed, 23 Jan 2019 06:35:40 -0400</pubDate>
      <guid>https://guardianproject.info/2019/01/23/use-onions/https-for-software-updates/</guid>
      <description>&lt;p&gt;There is a new &lt;a href=&#34;https://lists.debian.org/debian-security-announce/2019/msg00010.html&#34; target=&#34;_blank&#34;&gt;vulnerability in Debian’s apt&lt;/a&gt; that allows anything that can Man-in-the-Middle (MITM) your traffic to get root on your Debian/Ubuntu/etc boxes. Using encrypted connections for downloading updates, like HTTPS or Tor Onion Services, reduces this vulnerability to requiring root on the mirror server in order to exploit it. That is a drastic reduction in exposure. We have been pushing for this &lt;a href=&#34;https://guardianproject.info/2014/10/16/reducing-metadata-leakage-from-software-updates/&#34;&gt;since 2014&lt;/a&gt;, and &lt;a href=&#34;https://onion.debian.org&#34; target=&#34;_blank&#34;&gt;Debian&lt;/a&gt;, &lt;a href=&#34;https://ftp.fau.de&#34; target=&#34;_blank&#34;&gt;mirror&lt;/a&gt; &lt;a href=&#34;https://mirrors.kernel.org&#34; target=&#34;_blank&#34;&gt;operators&lt;/a&gt;, and others in the ecosystem have taken some big steps towards making this the standard. This should finally put to rest the idea that plain &lt;a href=&#34;https://whydoesaptnotusehttps.com/&#34; target=&#34;_blank&#34;&gt;HTTP is enough&lt;/a&gt; for software updates with signed metadata.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Wind is a Mozilla &amp; National Science Foundation Grand Prize Winner</title>
      <link>https://guardianproject.info/2018/09/26/wind-is-a-mozilla-national-science-foundation-grand-prize-winner/</link>
      <pubDate>Wed, 26 Sep 2018 10:54:38 -0400</pubDate>
      <guid>https://guardianproject.info/2018/09/26/wind-is-a-mozilla-national-science-foundation-grand-prize-winner/</guid>
      <description>&lt;p&gt;On August 14th, members of the Guardian Project team traveled to Mountain View to compete in the final round of the &lt;a href=&#34;https://wirelesschallenge.mozilla.org/&#34;&gt;Wireless Innovation for a Networked Society (WINS) Challenge&lt;/a&gt;. We learned in July that our &lt;a href=&#34;https://guardianproject.info/2018/07/20/our-wind-project-is-a-mozilla-nsf-challenge-finalist/&#34;&gt;Wind  project was a finalist&lt;/a&gt;, and we now had the opportunity to compete for one of the grand prizes, in a TED-meets-SharkTank style event, at Mozilla HQ.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wind&#34;&gt;Wind&lt;/a&gt; is a network designed for opportunistic communication and sharing of local knowledge that provides off-grid services for everyday people, using the mobile devices they already have. In the Wind network, Chime is the hyperlink, but one that exists in time and space, discoverable through beacon broadcasts and human-to-human sharing. All of this is powered by free and open-source software, running on readily available consumer hardware, and can be deployed at little to no cost, in a very short amount of time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IOCipher is the antidote to “Man-in-the-Disk” attack</title>
      <link>https://guardianproject.info/2018/08/17/iocipher-is-the-antidote-to-man-in-the-disk-attack/</link>
      <pubDate>Fri, 17 Aug 2018 16:56:00 -0400</pubDate>
      <guid>https://guardianproject.info/2018/08/17/iocipher-is-the-antidote-to-man-in-the-disk-attack/</guid>
      <description>&lt;p&gt;Recently, at DEFCON 2018, researchers at Check Point &lt;a href=&#34;https://blog.checkpoint.com/2018/08/12/man-in-the-disk-a-new-attack-surface-for-android-apps/&#34;&gt;announced a new kind of attack&lt;/a&gt; made possible by the way many Android apps are implemented. In summary, developers use the shared external storage space in an unsafe manner, by not taking into consideration that other apps also have read and write access to the same space. A malicious app can modify data used by another app, as a vector for compromising that app, causing it to be compromised or crash.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our “Wind” project is a Mozilla-NSF challenge finalist!</title>
      <link>https://guardianproject.info/2018/07/20/our-wind-project-is-a-mozilla-nsf-challenge-finalist/</link>
      <pubDate>Fri, 20 Jul 2018 14:28:23 -0400</pubDate>
      <guid>https://guardianproject.info/2018/07/20/our-wind-project-is-a-mozilla-nsf-challenge-finalist/</guid>
      <description>&lt;p&gt;For the last few years, we’ve been working on the &lt;a href=&#34;https://guardianproject.info/wind/&#34;&gt;Wind network concept&lt;/a&gt;, as a nearby, local, off-grid companion, or alternative, to the Web. This year, we decided to participate in the &lt;a href=&#34;https://wirelesschallenge.mozilla.org/&#34;&gt;Wireless Innovation Challenge&lt;/a&gt;, sponsored by Mozilla and the National Science Foundation. Today, it was announced that we are a finalist in, as they put it, &lt;a href=&#34;https://blog.mozilla.org/blog/2018/07/19/a-science-fair-with-1-6-million-in-prizes/&#34;&gt;“A Science Fair with $1.6 Million in Prizes”&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Watch the video below to learn more about Wind, or jump right over to the &lt;a href=&#34;https://guardianproject.info/wind/&#34;&gt;Wind project page&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot: Over 20 Million Served, Ready for the Next Billion</title>
      <link>https://guardianproject.info/2018/05/16/orbot-over-20-million-served-ready-for-the-next-billion/</link>
      <pubDate>Wed, 16 May 2018 07:42:38 -0400</pubDate>
      <guid>https://guardianproject.info/2018/05/16/orbot-over-20-million-served-ready-for-the-next-billion/</guid>
      <description>&lt;p&gt;We recently published the &lt;a href=&#34;https://github.com/n8fr8/orbot/releases/tag/16.0.2-RC-1&#34;&gt;latest release of Orbot (16.0.2!)&lt;/a&gt;, and as usual, we make it available via &lt;a href=&#34;https://play.google.com/store/apps/details?id=org.torproject.android&amp;amp;hl=en_US&#34;&gt;Google Play&lt;/a&gt;, as well &lt;a href=&#34;https://guardianproject.info/fdroid&#34;&gt;F-Droid&lt;/a&gt;, and through &lt;a href=&#34;https://guardianproject.info/releases/&#34;&gt;direct download&lt;/a&gt; on our website. Whether we like it or not, Google keeps tracks of things like total installs and active installs (i.e. not uninstalled), and reports on that for us through their dashboard. While publishing this release, we noticed a milestone that made us a bit proud… so pardon this humblebrag.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot v16: a whole new look, and easier to use!</title>
      <link>https://guardianproject.info/2018/01/05/orbot-v16-a-whole-new-look-and-easier-to-use/</link>
      <pubDate>Fri, 05 Jan 2018 13:14:17 -0400</pubDate>
      <guid>https://guardianproject.info/2018/01/05/orbot-v16-a-whole-new-look-and-easier-to-use/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/apps/orbot/&#34;&gt;Orbot: Tor for Android&lt;/a&gt; has a new release (&lt;a href=&#34;https://gitweb.torproject.org/orbot.git/tag/?h=16.0.0-RC-2&#34;&gt;tag&lt;/a&gt; and &lt;a href=&#34;https://gitweb.torproject.org/orbot.git/diff/CHANGELOG?h=16.0.0-RC-1-CHANGELOG&amp;amp;id=5542e8e192fcff24284179e7fdb31cf877f79efd&#34;&gt;changelog&lt;/a&gt;), with a major update to the user experience and interface. This is the 16th major release of Orbot, since it was launched in late 2009.&lt;/p&gt;&#xA;&lt;p&gt;The main screen of the app now looks quite different, with all the major features and functions exposed for easy access. We have also added a new onboarding setup wizard for first time users, that assists with configuring connections to the Tor network for users in places where Tor itself is blocked. This release also continues to support users looking to use Orbot to unblock specific apps, that may not be available on their network or country. From the main screen, users can activate Orbot’s built-in VPN feature, and easily choose which specific apps they want to be routed over the Tor network. You can also refresh your Tor identity, rebuilding all circuit connections through the network, using the circular reload icon in the expanded notification provided by Orbot.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Haven: Building the Most Secure Baby Monitor Ever?</title>
      <link>https://guardianproject.info/2017/12/22/haven-building-the-most-secure-baby-monitor-ever/</link>
      <pubDate>Fri, 22 Dec 2017 09:07:00 -0400</pubDate>
      <guid>https://guardianproject.info/2017/12/22/haven-building-the-most-secure-baby-monitor-ever/</guid>
      <description>&lt;p&gt;About eight months ago, friends at the &lt;a href=&#34;https://freedom.press/&#34;&gt;Freedom of the Press Foundation&lt;/a&gt; reached out to us, to see if we were interested in prototyping an idea they had been batting around. They knew that from projects like &lt;a href=&#34;https://guardianproject.info/apps/camerav&#34;&gt;CameraV&lt;/a&gt; and &lt;a href=&#34;https://guardianproject.info/2017/02/24/combating-fake-news-with-a-smartphone-proof-mode/&#34;&gt;Proofmode&lt;/a&gt;, that we knew how to tap into the sensors on smartphones to do interesting things. They also knew we could connect devices together using encrypted messaging and onion routing, through our work on &lt;a href=&#34;https://chatsecure.org&#34;&gt;ChatSecure&lt;/a&gt; and Tor (&lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;Orbot!&lt;/a&gt;). They also knew of our deep interest in bringing ideas to life that can solve real problems faced by people out on the front lines (both at home and abroad), who often are more in danger from physical threats, than digital. They had a concept that would bring all of these things together, and just wanted to see if it was even possible. We were game, and well, here we are today, announcing a real working public beta, and a new open-source project, that we are extremely excited about.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building a Signing Server</title>
      <link>https://guardianproject.info/2017/12/18/building-a-signing-server/</link>
      <pubDate>Mon, 18 Dec 2017 05:43:34 -0400</pubDate>
      <guid>https://guardianproject.info/2017/12/18/building-a-signing-server/</guid>
      <description>&lt;p&gt;The Android APK signing model sets the expectation that the signing key will be the same for the entire lifetime of the app. That can be seen in the recommended lifetype of an Android signing key: &lt;a href=&#34;https://developer.android.com/studio/publish/app-signing.html#considerations&#34;&gt;20+ years&lt;/a&gt;. On top of that, it is difficult to &lt;a href=&#34;https://guardianproject.info/2015/12/29/how-to-migrate-your-android-apps-signing-key/&#34;&gt;migrate an app to a new key&lt;/a&gt;. Since the signing key is an essential part to preventing APKs from impersonating another, Android signing keys must be kept safe for the entire life of the app.&lt;/p&gt;</description>
    </item>
    <item>
      <title>No more “Root” features in Orbot… use Orfox &amp; VPN instead!</title>
      <link>https://guardianproject.info/2017/10/27/no-more-root-features-in-orbot-use-orfox-vpn-instead/</link>
      <pubDate>Fri, 27 Oct 2017 13:02:02 -0400</pubDate>
      <guid>https://guardianproject.info/2017/10/27/no-more-root-features-in-orbot-use-orfox-vpn-instead/</guid>
      <description>&lt;p&gt;Since I first announced the available of Orbot: Tor for Android about &lt;a href=&#34;https://nathan.freitas.net/2009/10/22/orbot-proxy/&#34;&gt;8 years ago&lt;/a&gt; (wow!), myself and others have been working on various methods in which to make the capabilities of Tor available through the operating system. This post is to announce that as of the next, imminent release, &lt;a href=&#34;https://github.com/n8fr8/orbot/releases/tag/15.5.0-RC-1-multi-SDK16&#34;&gt;Orbot v15.5,&lt;/a&gt; we will no longer be supporting the Root-required “Transproxy” method. This is due to many reasons.&lt;/p&gt;&#xA;&lt;p&gt;First, it turns out that allowing applications to get “root” access on your device seems like a good idea, it can also be seen as huge security hole. I am on the fence myself, but considering that the ability to access root features hasn’t been standardized as part of Android, which 8 years ago I hoped it would, it means there are a whole variety of ways that this capability is managed and safeguarded (or not, in most cases). At this point in time, given the sophistication we are seeing mobile malware and rootkits, it seems like a capability that we did not want to focus time and energy on promoting.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ostel.co is permanently offline</title>
      <link>https://guardianproject.info/2017/08/10/ostel.co-is-permanently-offline/</link>
      <pubDate>Thu, 10 Aug 2017 17:16:51 -0400</pubDate>
      <guid>https://guardianproject.info/2017/08/10/ostel.co-is-permanently-offline/</guid>
      <description>&lt;p&gt;We are sad to announce that the &lt;a href=&#34;https://guardianproject.info/apps/ostel/&#34;&gt;Ostel service&lt;/a&gt; is officially discontinued and permanently offline. While Guardian Project had a hand &lt;a href=&#34;https://dev.guardianproject.info/projects/ostel/wiki&#34;&gt;in its conception and initial implementation&lt;/a&gt;, the actual operation of the service was &lt;a href=&#34;https://guardianproject.info/2013/12/03/ostel-co-secure-voip-network-partners-with-open-hosting/&#34;&gt;spun out long ago&lt;/a&gt; to be run by a new venture a member of our original team. They have kept Ostel running free of charge for many years of reliable service, but at this point it seems, they have decided they can no longer do so.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Repomaker Usability Trainers Worldwide, June 2017</title>
      <link>https://guardianproject.info/2017/06/29/repomaker-usability-trainers-worldwide-june-2017/</link>
      <pubDate>Thu, 29 Jun 2017 08:13:04 -0400</pubDate>
      <guid>https://guardianproject.info/2017/06/29/repomaker-usability-trainers-worldwide-june-2017/</guid>
      <description>&lt;h1 id=&#34;repomaker-usability-trainers-worldwide-study&#34;&gt;Repomaker Usability, Trainers Worldwide Study&lt;/p&gt;&lt;/h1&gt;&#xA;&lt;p&gt;Prepared by Carrie Winfrey and Tiffany Robertson, Okthanks, in partnership with F-Droid and Guardian Project&lt;/p&gt;&#xA;&lt;div id=&#34;attachment_13844&#34; style=&#34;width: 310px&#34; class=&#34;wp-caption aligncenter&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2017/06/okt-gp.png&#34;&gt;&lt;img aria-describedby=&#34;caption-attachment-13844&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2017/06/okt-gp-300x72.png&#34; alt=&#34;&#34; width=&#34;300&#34; height=&#34;72&#34; class=&#34;size-medium wp-image-13844&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2017/06/okt-gp-300x72.png 300w, https://guardianproject.info/wp-content/uploads/2017/06/okt-gp-768x184.png 768w, https://guardianproject.info/wp-content/uploads/2017/06/okt-gp-1024x246.png 1024w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p id=&#34;caption-attachment-13844&#34; class=&#34;wp-caption-text&#34;&gt;&#xA;    OK Thanks – Guardian Project&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;p&gt;For more information, contact carrie@okthanks.com.&lt;/p&gt;&#xA;&lt;h1 id=&#34;purpose&#34;&gt;Purpose&lt;/h1&gt;&#xA;&lt;p&gt;The purpose of this study was to understand the following things.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Are users able to complete basic tasks including, creating a repo, adding apps from other repos, removing apps, editing app details, and creating a second repo?&lt;/li&gt;&#xA;&lt;li&gt;Do participants understand how to get the apps from a repo installed on an Android phone?&lt;/li&gt;&#xA;&lt;li&gt;Word choice—Do people understand the word repo?&lt;/li&gt;&#xA;&lt;li&gt;Is repomaker a useful tool to participants?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tracking usage without tracking people</title>
      <link>https://guardianproject.info/2017/06/08/tracking-usage-without-tracking-people/</link>
      <pubDate>Thu, 08 Jun 2017 10:58:53 -0400</pubDate>
      <guid>https://guardianproject.info/2017/06/08/tracking-usage-without-tracking-people/</guid>
      <description>&lt;p&gt;One thing that has become very clear over the past years is that there is a lot of value in data about people. Of course, the most well known examples these days are advertising and spy agencies, but tracking data is useful for many more things. For example, when trying to build software that is intuitive and easy to use, having real data about how people are using the software can make a massive difference when developers and designers are working on improving their software. Even in the case of advertisers, they mostly do not care exactly who you are, they want to know what you are interested in so that they can more effectively promote things to you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>fdroidserver UX Testing Report</title>
      <link>https://guardianproject.info/2017/06/01/fdroidserver-ux-testing-report/</link>
      <pubDate>Thu, 01 Jun 2017 04:36:14 -0400</pubDate>
      <guid>https://guardianproject.info/2017/06/01/fdroidserver-ux-testing-report/</guid>
      <description>&lt;p&gt;We ran user tests of &lt;a href=&#34;https://gitlab.com/fdroid/fdroidserver&#34; target=&#34;_blank&#34;&gt;&lt;em&gt;fdroidserver&lt;/em&gt;&lt;/a&gt;, the tools for developers to create and manage F-Droid repositories of apps and media. This test was set up to gather usability feedback about the tools themselves and the related documentation. These tests were put together and run by Seamus Tuohy/Prudent Innovation.&lt;/p&gt;&#xA;&lt;h1 id=&#34;methodology&#34;&gt;Methodology&lt;/h1&gt;&#xA;&lt;p&gt;Participants completed a pretest demographic/background information questionnaire. The facilitator then explained that the amount of time taken to complete the test task will be measured and that exploratory behavior within the app should take place after the tasks are completed. &lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing new libraries: F-Droid Update Channels</title>
      <link>https://guardianproject.info/2017/05/31/announcing-new-libraries-f-droid-update-channels/</link>
      <pubDate>Wed, 31 May 2017 11:40:27 -0400</pubDate>
      <guid>https://guardianproject.info/2017/05/31/announcing-new-libraries-f-droid-update-channels/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2017/05/refresh-525698_640.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2017/05/refresh-525698_640-150x150.png&#34; alt=&#34;&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignleft size-thumbnail wp-image-13626&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2017/05/refresh-525698_640-150x150.png 150w, https://guardianproject.info/wp-content/uploads/2017/05/refresh-525698_640-300x297.png 300w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;br&gt;&#xA;In many places in the world, it is very common to find Android apps via a multitude of sources: third party app stores, Bluetooth transfers, swapping SD cards, or directly downloaded from websites. As developers, we want to make sure that our users get secure and timely update no matter how they got our apps. We still recommend that people get apps from trusted sources like F-Droid or Google Play.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New research report on the challenges developers face</title>
      <link>https://guardianproject.info/2017/05/15/new-research-report-on-the-challenges-developers-face/</link>
      <pubDate>Mon, 15 May 2017 05:07:17 -0400</pubDate>
      <guid>https://guardianproject.info/2017/05/15/new-research-report-on-the-challenges-developers-face/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2017/06/tccw.png&#34;&gt;&lt;img class=&#34;aligncenter size-full wp-image-13792&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2017/06/tccw.png&#34; alt=&#34;&#34; width=&#34;845&#34; height=&#34;375&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2017/06/tccw.png 845w, https://guardianproject.info/wp-content/uploads/2017/06/tccw-300x133.png 300w, https://guardianproject.info/wp-content/uploads/2017/06/tccw-768x341.png 768w&#34; sizes=&#34;(max-width: 845px) 100vw, 845px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The Guardian Project has been working with the &lt;a href=&#34;https://f-droid.org&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;F-Droid&lt;/a&gt; community to make it a secure, streamlined, and verifiable app distribution channel for high-risk environments. While doing this we have started to become more aware of the challenges and risks facing software developers who build software in closed and closing spaces around the world.&lt;/p&gt;&#xA;&lt;p&gt;There are a wealth of resources available on how to support and collaborate with high-risk users. Surprisingly, we could not find any guidance on how to support and collaborate with developers where the internet is heavily monitored and/or filtered, let alone developers who might be at risk because of the software they develop.&lt;/p&gt;</description>
    </item>
    <item>
      <title>F-Droid User Testing, Round 2</title>
      <link>https://guardianproject.info/2017/05/01/f-droid-user-testing-round-2/</link>
      <pubDate>Mon, 01 May 2017 04:51:24 -0400</pubDate>
      <guid>https://guardianproject.info/2017/05/01/f-droid-user-testing-round-2/</guid>
      <description>&lt;p&gt;#&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2017/06/null14.png&#34; width=&#34;624&#34; height=&#34;164&#34; alt=&#34;&#34; title=&#34;&#34; /&gt;&lt;/p&gt;&#xA;&lt;p&gt;by Hailey Still and Carrie Winfrey&lt;/p&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;heading&#34;&gt;****&lt;/h1&gt;&#xA;&lt;p&gt;Here we outline the User Testing process and plan for the &lt;a href=&#34;https://f-droid.org&#34; target=&#34;_blank&#34;&gt;F-Droid&lt;/a&gt; app store for Android. The key aims of F-Droid are to provide users with a) a comprehensive catalogue of open-source apps, as well as b) provide users with the the ability to transfer any app from their phone to someone in close physical proximity. With this User Test, we are hoping to gain insights into where the product design is successful and what aspects need to be further improved. Main goals are obtaining a baseline user performance and identifying potential design concerns regarding ease of use. An additional goal is to promote F-Droid as an alternative to the Google Play app store.&lt;/p&gt;</description>
    </item>
    <item>
      <title>F-Droid: A new UX 6 years in the making</title>
      <link>https://guardianproject.info/2017/04/17/f-droid-a-new-ux-6-years-in-the-making/</link>
      <pubDate>Mon, 17 Apr 2017 10:19:19 -0400</pubDate>
      <guid>https://guardianproject.info/2017/04/17/f-droid-a-new-ux-6-years-in-the-making/</guid>
      <description>&lt;p&gt;&lt;em&gt;(post by &lt;a href=&#34;http://peter.serwylo.com/&#34; target=&#34;_blank&#34;&gt;Peter Serwylo&lt;/a&gt;)&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;F-Droid has been a part of the Android ecosystem for over 6 years now.&lt;br&gt;&#xA;Since then, over 2000 apps have been built for the main repository,&lt;br&gt;&#xA;many &lt;a href=&#34;https://gitlab.com/fdroid/fdroidclient/blob/master/CHANGELOG.md&#34; target=&#34;_blank&#34;&gt;great features have been added&lt;/a&gt;, the client has been translated into over 40 different languages, and much more.&lt;/p&gt;&#xA;&lt;p&gt;However, the F-Droid UX has never changed much from &lt;a href=&#34;https://f-droid.org/posts/f-droid-repository-alpha&#34; target=&#34;_blank&#34;&gt;the original three tab layout&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.11.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.11.png&#34; alt=&#34;&#34; width=&#34;320&#34; height=&#34;427&#34; class=&#34;size-full wp-image-13585&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.11.png 320w, https://guardianproject.info/wp-content/uploads/2017/04/0.11-225x300.png 225w&#34; sizes=&#34;(max-width: 320px) 100vw, 320px&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.102.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.102.png&#34; alt=&#34;&#34; width=&#34;323&#34; height=&#34;427&#34; class=&#34;size-full wp-image-13584&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2017/04/0.102.png 323w, https://guardianproject.info/wp-content/uploads/2017/04/0.102-227x300.png 227w&#34; sizes=&#34;(max-width: 323px) 100vw, 323px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>F-Droid Lubbock Report – What We Want to Know</title>
      <link>https://guardianproject.info/2017/04/17/f-droid-lubbock-report-what-we-want-to-know/</link>
      <pubDate>Mon, 17 Apr 2017 08:07:47 -0400</pubDate>
      <guid>https://guardianproject.info/2017/04/17/f-droid-lubbock-report-what-we-want-to-know/</guid>
      <description>&lt;hr&gt;&#xA;&lt;h1 id=&#34;f-droid-lbk-usability-study-report--what-we-want-to-know&#34;&gt;F-Droid LBK Usability Study Report – What We Want to Know&lt;/p&gt;&lt;/h1&gt;&#xA;&lt;p&gt;Prepared by Carrie Winfrey&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Preliminary Version – April 17, 2017&lt;/em&gt;&lt;/p&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;When planning this user test, the team outlined features and flows within the app on which we wanted feedback. From there, we created tasks for participants to complete that would access these areas, and produce insights related to our inquires.&lt;/p&gt;&lt;/p&gt;&#xA;&lt;p&gt;This document is organized by the tasks participants completed. Initial inquiry questions are outlined under each task, followed by the feedback and observations gained from the test. Last, within each section, I’ve listed suggestions for improvement related to the task.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Proofmode critiques and progress</title>
      <link>https://guardianproject.info/2017/03/30/proofmode-critiques-and-progress/</link>
      <pubDate>Thu, 30 Mar 2017 09:53:22 -0400</pubDate>
      <guid>https://guardianproject.info/2017/03/30/proofmode-critiques-and-progress/</guid>
      <description>&lt;p&gt;Bruce Schneier was kind enough to &lt;a href=&#34;https://www.schneier.com/blog/archives/2017/03/proof_mode_for_.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter&#34;&gt;post about our work on Proofmode&lt;/a&gt; to his &lt;a href=&#34;https://www.schneier.com&#34;&gt;blog&lt;/a&gt;. A decent set of comments ensued, which we have considered, measured and weighed. We posted the response below on the post, and now also here. We also received an excellent set of &lt;a href=&#34;http://www.lieberbiber.de/2017/03/07/the-guardian-projects-proof-mode-app-for-activists-doesnt-work/&#34;&gt;feedback from the Lieberbiber blog&lt;/a&gt;. Below are responses to the various concerns raised, and links to work completed or in progress.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;At a high level, securely dating files, digital notarization, easy capture of sensor metadata, among other things, are not solved problems. For every day activists around the world, who may only have a cheap smartphone as their only computing device, they have no easy way to do any of these things. Even for high-level war crimes investigators, they are often using consumer point and shoot digital cameras, and documenting everything on paper.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing the Developer Challenges Survey</title>
      <link>https://guardianproject.info/2017/03/21/announcing-the-developer-challenges-survey/</link>
      <pubDate>Tue, 21 Mar 2017 11:32:22 -0400</pubDate>
      <guid>https://guardianproject.info/2017/03/21/announcing-the-developer-challenges-survey/</guid>
      <description>&lt;p&gt;&lt;span style=&#34;font-weight: 400&#34;&gt;In the &lt;/span&gt;&lt;a href=&#34;https://guardianproject.info/&#34;&gt;&lt;span style=&#34;font-weight: 400&#34;&gt;Guardian Project&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400&#34;&gt;‘s current work with the &lt;/span&gt;&lt;a href=&#34;https://f-droid.org/&#34;&gt;&lt;span style=&#34;font-weight: 400&#34;&gt;FDroid&lt;/span&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400&#34;&gt;community to make it a secure, streamlined, and verifiable app distribution channel for high-risk environments we have started to become more aware of the challenges and risks facing software developers who build software in around the world.&lt;/span&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;span style=&#34;font-weight: 400&#34;&gt;There are a wealth of resources available on how to support and collaborate with high-risk users. Surprisingly, we could not find any guidance on how to support and collaborate with developers where the internet is heavily monitored and/or filtered, let alone developers who might be at risk because of the software they develop.&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build Android apps with Debian: apt install android-sdk</title>
      <link>https://guardianproject.info/2017/03/13/build-android-apps-with-debian-apt-install-android-sdk/</link>
      <pubDate>Mon, 13 Mar 2017 10:03:30 -0400</pubDate>
      <guid>https://guardianproject.info/2017/03/13/build-android-apps-with-debian-apt-install-android-sdk/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian-150x150.jpg&#34; alt=&#34;&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-12920&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2015/04/debian-300x300.jpg 300w, https://guardianproject.info/wp-content/uploads/2015/04/debian-270x270.jpg 270w, https://guardianproject.info/wp-content/uploads/2015/04/debian-230x230.jpg 230w, https://guardianproject.info/wp-content/uploads/2015/04/debian.jpg 600w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;br&gt;&#xA;In Debian stretch, the upcoming new release, it is now possible to build Android apps using only packages from Debian. This will provide all of the tools needed to build an Android app targeting the “platform” &lt;tt&gt;android-23&lt;/tt&gt; using the SDK &lt;tt&gt;build-tools&lt;/tt&gt; 24.0.0. Those two are the only versions of “platform” and “build-tools” currently in Debian, but it is possible to use the Google binaries by installing them into &lt;tt&gt;/usr/lib/android-sdk&lt;/tt&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Combating “Fake News” With a Smartphone “Proof Mode”</title>
      <link>https://guardianproject.info/2017/02/24/combating-fake-news-with-a-smartphone-proof-mode/</link>
      <pubDate>Fri, 24 Feb 2017 02:10:47 -0400</pubDate>
      <guid>https://guardianproject.info/2017/02/24/combating-fake-news-with-a-smartphone-proof-mode/</guid>
      <description>&lt;p&gt;We have been working for many years with our partners at &lt;a href=&#34;https://witness.org&#34;&gt;WITNESS&lt;/a&gt;, a leading human rights media training and advocacy organization, to figure out how best to turn smartphone cameras into tools of empowerment for activists. While it is often enough to use the visual pixels you capture to create awareness or pressure on an issue, sometimes you want those pixels to actually be treated as evidence. This means, you want people to trust what they see, to know it hasn’t been tampered with, and to believe that it came from the time, place and person you say it came from.&lt;/p&gt;</description>
    </item>
    <item>
      <title>F-Droid now supports APK Expansion Files aka OBB</title>
      <link>https://guardianproject.info/2017/02/22/f-droid-now-supports-apk-expansion-files-aka-obb/</link>
      <pubDate>Wed, 22 Feb 2017 10:24:53 -0400</pubDate>
      <guid>https://guardianproject.info/2017/02/22/f-droid-now-supports-apk-expansion-files-aka-obb/</guid>
      <description>&lt;p&gt;Many games, mapping, and other apps require a large amount of data to work. The APK file of an Android app is limited to 100MB in size, yet it is common for a single country map file to be well over 100MB. Also, in order to get users running as quickly as possible, they should not have to wait for huge amounts of data to download in order to just start the app for the first time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build Your Own App Store: Android Media Distribution for Everyone</title>
      <link>https://guardianproject.info/2017/02/22/build-your-own-app-store-android-media-distribution-for-everyone/</link>
      <pubDate>Wed, 22 Feb 2017 09:45:11 -0400</pubDate>
      <guid>https://guardianproject.info/2017/02/22/build-your-own-app-store-android-media-distribution-for-everyone/</guid>
      <description>&lt;p&gt;Most people get their Android apps from Google Play. It is usually the simplest and most secure option for them. But there are also many people who do not have access to Google Play. This might be due to lack of a proper internet connection or simply because Google Play is blocked within their country.&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://f-droid.org/&#34;&gt;F-Droid&lt;/a&gt; project already offers &lt;a href=&#34;https://guardianproject.info/2015/06/02/building-a-trustworthy-app-store-that-respects-privacy/&#34;&gt;tools to create independent app distribution channels for Android apps&lt;/a&gt;. These tools are ready for production, but require expert knowledge and the command-line to be used. Now, we want to build upon this foundation and develop curation tools that can also be used by people with little technical knowledge, thus making the app distribution technology more broadly available.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How can we learn without watching?</title>
      <link>https://guardianproject.info/2017/01/30/how-can-we-learn-without-watching/</link>
      <pubDate>Mon, 30 Jan 2017 14:40:05 -0400</pubDate>
      <guid>https://guardianproject.info/2017/01/30/how-can-we-learn-without-watching/</guid>
      <description>&lt;p&gt;What kind of measurement, tracking or analytics do you use, and can you sleep at night with your decision?&lt;/p&gt;&#xA;&lt;p&gt;As part of the &lt;a href=&#34;https://berkmankleinassembly.org/&#34;&gt;Berkman-Klein Assembly&lt;/a&gt; program at Harvard, I am working with a team to imagine a next-generation mobile and IoT analytics system that has privacy, confidentiality and anonymity at its core. The hope is we can find ways to learn what our users like and understand how our apps are performing without having to rely on proprietary cloud services, logging liability, network vulnerabilities, and invasive app permissions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Imagining the challenges of developers in repressive environments</title>
      <link>https://guardianproject.info/2017/01/26/imagining-the-challenges-of-developers-in-repressive-environments/</link>
      <pubDate>Thu, 26 Jan 2017 09:56:59 -0400</pubDate>
      <guid>https://guardianproject.info/2017/01/26/imagining-the-challenges-of-developers-in-repressive-environments/</guid>
      <description>&lt;p&gt;The Guardian Project team spends a lot of time thinking about users. In our work we focus on easy-to-use applications for users in high-risk scenarios. Because of this we are very focused on security. In our current work with the FDroid community to make it a secure, streamlined, and verifiable app distribution channel for high-risk environments we have started to become &lt;a href=&#34;https://guardianproject.info/2015/02/24/phishing-for-developers/&#34;&gt;more aware&lt;/a&gt; of the challenges and risks facing software developers who build software in high-risk environments.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Partnership with Circle of 6 mobile safety app</title>
      <link>https://guardianproject.info/2017/01/19/new-partnership-with-circle-of-6-mobile-safety-app/</link>
      <pubDate>Thu, 19 Jan 2017 06:00:34 -0400</pubDate>
      <guid>https://guardianproject.info/2017/01/19/new-partnership-with-circle-of-6-mobile-safety-app/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Circle of 6 Focuses on Security with Guardian Project Partnership&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Safety App Will Get End-to-End Encryption and More To Support High-Risk Communities&lt;/span&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;New York, NY:&lt;/strong&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;Two innovative organizations have partnered to bring increased digital security and privacy capabilities to users interested in improved safety for their mobile devices. Tech 4 Good, the developer of Circle of 6, a highly regarded mobile safety app developed to promote safety and health through networks of trust, has partnered with Guardian Project, a leader in mobile security and privacy technologies. The two organizations will work to upgrade the capabilities of the Circle of 6 app to provide users with secure messaging, private identities and improved physical security of device data.&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orfox 1.2.1 released</title>
      <link>https://guardianproject.info/2016/12/02/orfox-1.2.1-released/</link>
      <pubDate>Fri, 02 Dec 2016 00:50:40 -0400</pubDate>
      <guid>https://guardianproject.info/2016/12/02/orfox-1.2.1-released/</guid>
      <description>&lt;p&gt;We’ve released a new version of &lt;a href=&#34;https://guardianproject.info/apps/orfox/&#34;&gt;Orfox&lt;/a&gt;, our Tor Browser for Android, that contains an an &lt;a href=&#34;https://blog.mozilla.org/security/2016/11/30/fixing-an-svg-animation-vulnerability/&#34; rel=&#34;nofollow&#34;&gt;important security update to Firefox&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;This update is based on the &lt;a href=&#34;https://blog.torproject.org/blog/tor-browser-607-released&#34;&gt;latest release of Tor Browser&lt;/a&gt;, which was announced with this message:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The security flaw responsible for this urgent release is already actively exploited on Windows systems. Even though there is currently, to the best of our knowledge, no similar exploit for OS X or Linux users available the underlying bug affects those platforms as well. Thus &lt;strong&gt;we strongly recommend that all users apply the update to their Tor Browser immediately.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>“If This, Then Panic!” Sample Code for Triggering Emergency Alerts</title>
      <link>https://guardianproject.info/2016/10/17/if-this-then-panic-sample-code-for-triggering-emergency-alerts/</link>
      <pubDate>Mon, 17 Oct 2016 09:55:22 -0400</pubDate>
      <guid>https://guardianproject.info/2016/10/17/if-this-then-panic-sample-code-for-triggering-emergency-alerts/</guid>
      <description>&lt;p&gt;Earlier this year, we announced the &lt;a href=&#34;https://guardianproject.info/2016/01/12/panickit-making-your-whole-phone-respond-to-a-panic-button/&#34;&gt;PanicKit Library for Android&lt;/a&gt; and &lt;a href=&#34;https://dev.guardianproject.info/news/257&#34;&gt;Ripple&lt;/a&gt;, our basic app for alerts any compatible app that you are in an emergency situation. Rather than build a solitary, enclosed “panic button” app that only can provide a specific set of functionality, we decided, as we often do, to build a framework, and encourage others to participate. Since then, we’ve had &lt;a href=&#34;https://dev.guardianproject.info/projects/panic/news&#34;&gt;over 10 different apps implement PanicKit r&lt;/a&gt;esponder functionality, including Signal, OpenKeyChain, Umbrella app, StoryMaker and Zom.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orfox 1.2: An Overdue Update to Our Privacy-Focused Browser!</title>
      <link>https://guardianproject.info/2016/09/25/orfox-1.2-an-overdue-update-to-our-privacy-focused-browser/</link>
      <pubDate>Sun, 25 Sep 2016 00:43:54 -0400</pubDate>
      <guid>https://guardianproject.info/2016/09/25/orfox-1.2-an-overdue-update-to-our-privacy-focused-browser/</guid>
      <description>&lt;div class=&#34;markdown-body&#34;&gt;&#xA;  &lt;p&gt;&#xA;    Primarily this release is the first in a long while after improving our ability to stay up-to-date with core Tor Browser development. In addition, as Mozilla adds more and more features to the core Firefox, we must review them for any issues related to increased permission request, access to data, and privacy and network leaks. This is a slow, tedious job, so thank you for your patience. We expect to have more frequent, regular releases moving forward.&#xA;  &lt;/p&gt;</description>
    </item>
    <item>
      <title>HOWTO: get all your Debian packages via Tor Onion Services</title>
      <link>https://guardianproject.info/2016/07/31/howto-get-all-your-debian-packages-via-tor-onion-services/</link>
      <pubDate>Sun, 31 Jul 2016 17:28:57 -0400</pubDate>
      <guid>https://guardianproject.info/2016/07/31/howto-get-all-your-debian-packages-via-tor-onion-services/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage-300x199.png&#34; alt=&#34;leakage&#34; width=&#34;300&#34; height=&#34;199&#34; class=&#34;alignright size-medium wp-image-12699&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage-300x199.png 300w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-100x66.png 100w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-150x99.png 150w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-200x132.png 200w, https://guardianproject.info/wp-content/uploads/2014/10/leakage.png 410w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;Following up on &lt;a href=&#34;https://guardianproject.info/2014/10/16/reducing-metadata-leakage-from-software-updates/&#34; target=&#34;_blank&#34;&gt;some privacy leaks that we looked into a while back&lt;/a&gt;, there are now official Debian &lt;a href=&#34;https://onion.debian.org&#34; target=&#34;_blank&#34;&gt;Tor Onion Services&lt;/a&gt; for getting software packages and security updates, thanks to the Debian Sys Admin team. This is important for high risk use cases like TAILS covers, but also it is useful to make it more difficult to do some kinds of targeted attacks against high-security servers. The default Debian and Ubuntu package servers use plain HTTP with unencrypted connections. That means anyone with access to the network streams could both monitor and fingerprint traffic. When an request for a security update is spotted, an attacker knows that machine is vulnerable to an exploit, and could reliably exploit it before the security update is applied.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OpenArchive: Free &amp; Secure Mobile Media Sharing #DWebSummit</title>
      <link>https://guardianproject.info/2016/06/07/openarchive-free-secure-mobile-media-sharing-%23dwebsummit/</link>
      <pubDate>Tue, 07 Jun 2016 15:37:03 -0400</pubDate>
      <guid>https://guardianproject.info/2016/06/07/openarchive-free-secure-mobile-media-sharing-%23dwebsummit/</guid>
      <description>&lt;p&gt;I am excited to share another new “mini app” effort we have joined up with, as part of work we are doing to create simple, focused tools that solve a single issue. We also are aiming to builds apps that are 1 to 3MB in size, and work on Android phones back to version 2.3, in order to maximize accessibility for a global audience.  &lt;a href=&#34;https://open-archive.net&#34;&gt;&lt;span class=&#34;il&#34;&gt;OpenArchive&lt;/span&gt;&lt;/a&gt; is one of these efforts. It is a project led by &lt;a href=&#34;https://www.aaronswartzday.org/openarchive/&#34;&gt;Natalie Cadranel&lt;/a&gt;, who received a &lt;a href=&#34;https://www.knightfoundation.org/grants/201448513/&#34;&gt;Knight Foundation prototype grant in 2014&lt;/a&gt;. The initial work was done by our partners at &lt;a href=&#34;https://www.scal.io/&#34;&gt;Scal.io&lt;/a&gt;, and continued now by the core Guardian Project team. The app is now in &lt;a href=&#34;https://play.google.com/store/apps/details?id=net.opendasharchive.openarchive.release&#34;&gt;stable beta&lt;/a&gt; and ready for &lt;a href=&#34;https://github.com/OpenArchive/openarchive/issues&#34;&gt;wider testing&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building the most private app store</title>
      <link>https://guardianproject.info/2016/06/02/building-the-most-private-app-store/</link>
      <pubDate>Thu, 02 Jun 2016 11:08:52 -0400</pubDate>
      <guid>https://guardianproject.info/2016/06/02/building-the-most-private-app-store/</guid>
      <description>&lt;p&gt;&lt;em&gt;App stores can work well without any tracking at all&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2016/06/whichdoor.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2016/06/whichdoor-150x150.jpg&#34; alt=&#34;whichdoor&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-13337&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Attackers are increasingly seeing app stores as a prime &lt;a href=&#34;https://guardianproject.info/2015/02/24/phishing-for-developers/&#34; target=&#34;_blank&#34;&gt;attack&lt;/a&gt; vector, whether it is aimed at the masses like &lt;a href=&#34;http://researchcenter.paloaltonetworks.com/2015/09/more-details-on-the-xcodeghost-malware-and-affected-ios-apps/&#34;&gt;XCodeGhost&lt;/a&gt; or very targeted like in FBI vs Apple. When we install software from an app store, we are placing a lot of trust in a lot of different parties involved in getting the source code from the original developer delivered to our device in a useful form. Most people are entirely unaware of how much trust they are putting into this system, which they are entrusting with their personal data. Even for people who do understand the technical details involved, figuring out whether the people and the system itself is trustworthy is difficult to do.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Data Usage and Protection Policies</title>
      <link>https://guardianproject.info/2016/05/04/data-usage-and-protection-policies/</link>
      <pubDate>Wed, 04 May 2016 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2016/05/04/data-usage-and-protection-policies/</guid>
      <description>&lt;p&gt;At a high level, it is easy say that &amp;ldquo;we know nothing&amp;rdquo;. We do not log data or include analytics in our websites or applications. When we do operate servers to support our applications, they are configured to store as minimal data as possible, usually just a username and password, if that is required. We also only recommend third party services, such as &lt;a href=&#34;https://www.otr.im/chat.html&#34;&gt;XMPP services&lt;/a&gt;, &lt;a href=&#34;https://ostel.co&#34;&gt;VoIP services&lt;/a&gt;, or &lt;a href=&#34;https://torproject.org&#34;&gt;Proxy and VPN providers&lt;/a&gt;, who abide by these same policies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Copperhead, Guardian Project and F-Droid Partner to Build Open, Verifiably Secure Mobile Ecosystem</title>
      <link>https://guardianproject.info/2016/03/28/copperhead-guardian-project-and-f-droid-partner-to-build-open-verifiably-secure-mobile-ecosystem/</link>
      <pubDate>Mon, 28 Mar 2016 13:42:36 -0400</pubDate>
      <guid>https://guardianproject.info/2016/03/28/copperhead-guardian-project-and-f-droid-partner-to-build-open-verifiably-secure-mobile-ecosystem/</guid>
      <description>&lt;p&gt;Three open-source projects haved joined together to announce a new partnership to create an open, verifiably secure mobile ecosystem of software, services and hardware. Led by the work of the Toronto-based &lt;a href=&#34;https://copperhead.co/android/&#34;&gt;CopperheadOS&lt;/a&gt; team on securing the core Android OS, &lt;a href=&#34;https://guardianproject.info&#34;&gt;Guardian Project&lt;/a&gt; and &lt;a href=&#34;https://f-droid.org&#34;&gt;F-Droid&lt;/a&gt; have joined in to partner on envisioning and developing a full mobile ecosystem. The goal is to create a solution that can be verifiably trusted from the operating system,  through the network and network services, all the way up to the app stores and apps themselves. Through a future planned crowdfunded and commercial offering, the partnership will provide affordable off-the-shelf solutions, including device hardware and self-hosted app and update distribution servers, for any individual and organizations looking for complete mobile stacks they can trust.&lt;/p&gt;</description>
    </item>
    <item>
      <title>PanicKit: making your whole phone respond to a panic button</title>
      <link>https://guardianproject.info/2016/01/12/panickit-making-your-whole-phone-respond-to-a-panic-button/</link>
      <pubDate>Tue, 12 Jan 2016 08:59:41 -0400</pubDate>
      <guid>https://guardianproject.info/2016/01/12/panickit-making-your-whole-phone-respond-to-a-panic-button/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard.png&#34; rel=&#34;attachment wp-att-13221&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard-150x150.png&#34; alt=&#34;round hazard button&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-13221&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard-150x150.png 150w, https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard-300x300.png 300w, https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard-200x200.png 200w, https://guardianproject.info/wp-content/uploads/2016/01/round-button-hazard.png 512w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;Our mobile devices do so many things for us, making it easy to communicate with people in all manners while giving us access to all sorts of information wherever we are. But in times of anxiety and panic, it is difficult to quickly use them. Will you be too shaky to type in your PIN or lock pattern? Will you have enough time to find your trusted contacts and send them a message? On top of that, our mobile devices carry massive amounts of private information in them: banking details, pictures, all of our messages and call logs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Migrate Your Android App’s Signing Key</title>
      <link>https://guardianproject.info/2015/12/29/how-to-migrate-your-android-apps-signing-key/</link>
      <pubDate>Tue, 29 Dec 2015 12:03:54 -0400</pubDate>
      <guid>https://guardianproject.info/2015/12/29/how-to-migrate-your-android-apps-signing-key/</guid>
      <description>&lt;p&gt;&lt;strong&gt;It is time to update to a stronger signing key for your Android app! The old default RSA 1024-bit key is weak and officially deprecated.&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;what&#34;&gt;What?&lt;/h2&gt;&#xA;&lt;p&gt;The Android OS requires that every application installed be signed by a digital key. The purpose behind this signature is to identify the author of the application, allow this author and this author alone to make updates to the app, as well as provide a mechanism to establish inter-application trust. The Android security model defines an app by two things: the package name (aka &lt;a href=&#34;https://developer.android.com/reference/android/content/Context.html#getPackageName%28%29&#34; target=&#34;_blank&#34;&gt;&lt;code&gt;packageName&lt;/code&gt;&lt;/a&gt;, &lt;a href=&#34;https://sites.google.com/a/android.com/tools/tech-docs/new-build-system/applicationid-vs-packagename&#34; target=&#34;_blank&#34;&gt;&lt;code&gt;ApplicationID&lt;/code&gt;&lt;/a&gt;, &lt;a href=&#34;https://developer.android.com/guide/topics/manifest/manifest-element.html#package&#34; target=&#34;_blank&#34;&gt;&lt;code&gt;package&lt;/code&gt;&lt;/a&gt;) and the signing key. If either of those are different, then Android considers it a different app. When the package name and signing key of one APK match an installed app, then the APK is considered an update and Android will replace the installed app with the APK. If the APK is signed by a different key, then Android will prevent installing and updating.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Good translations are essential to usability</title>
      <link>https://guardianproject.info/2015/12/09/good-translations-are-essential-to-usability/</link>
      <pubDate>Wed, 09 Dec 2015 17:20:15 -0400</pubDate>
      <guid>https://guardianproject.info/2015/12/09/good-translations-are-essential-to-usability/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/12/Rosetta-Stone.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/12/Rosetta-Stone-230x300.jpg&#34; alt=&#34;Rosetta Stone&#34; width=&#34;230&#34; height=&#34;300&#34; class=&#34;alignright size-medium wp-image-13155&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/12/Rosetta-Stone-230x300.jpg 230w, https://guardianproject.info/wp-content/uploads/2015/12/Rosetta-Stone-786x1024.jpg 786w, https://guardianproject.info/wp-content/uploads/2015/12/Rosetta-Stone.jpg 1164w&#34; sizes=&#34;(max-width: 230px) 100vw, 230px&#34; /&gt;&lt;/a&gt;All too often, translation of an app are treated as an afterthought. It is not something that the app developers see, since they create the software in languages that work best for them. So the software looks complete to the developers. But for anyone using the software in a different language, translation is essential in order for the app to be useful. If you can’t understand the words that you see in the app’s interface, it is going to be difficult or impossible to use that app.&lt;/p&gt;</description>
    </item>
    <item>
      <title>First Reproducible Builds Summit</title>
      <link>https://guardianproject.info/2015/12/09/first-reproducible-builds-summit/</link>
      <pubDate>Wed, 09 Dec 2015 05:02:48 -0400</pubDate>
      <guid>https://guardianproject.info/2015/12/09/first-reproducible-builds-summit/</guid>
      <description>&lt;p&gt;I was just in Athens for the “&lt;a href=&#34;https://reproducible-builds.org/events/athens2015/&#34;&gt;Reproducible Builds Summit&lt;/a&gt;“, an &lt;a href=&#34;https://aspirationtech.org/&#34; target=&#34;_blank&#34;&gt;Aspiration&lt;/a&gt;-run meeting focused on the issues of getting all software builds to be reproducible. This means that anyone starting with the same source code can build the &lt;em&gt;exact&lt;/em&gt; same binary, bit-for-bit. At first glance, it sounds like this horrible, arcane detail, which it is really. But it provides tons on real benefits that can save lots of time. And in terms of programming, it can actually be quite fun, like doing a puzzle or sudoku, since there is a very clear point where you have “won”.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CipherKit reproducible builds</title>
      <link>https://guardianproject.info/2015/09/21/cipherkit-reproducible-builds/</link>
      <pubDate>Mon, 21 Sep 2015 10:54:05 -0400</pubDate>
      <guid>https://guardianproject.info/2015/09/21/cipherkit-reproducible-builds/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg&#34; alt=&#34;alberti cipher disk&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-3079&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk.jpg 245w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;We have been on a kick recently with making our build process support “reproducible builds” aka “deterministic builds”. What is this reproducible thing? Basically, what that means is that you can run a script and end up with the &lt;em&gt;exact&lt;/em&gt; same binary file as our official releases, be it a APK, JAR, AAR, whatever. That lets anyone verify that our releases are produced only from the source in git, without including anything else, whether deliberately or accidentally (like malware).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orfox: Aspiring to bring Tor Browser to Android</title>
      <link>https://guardianproject.info/2015/06/30/orfox-aspiring-to-bring-tor-browser-to-android/</link>
      <pubDate>Tue, 30 Jun 2015 15:32:16 -0400</pubDate>
      <guid>https://guardianproject.info/2015/06/30/orfox-aspiring-to-bring-tor-browser-to-android/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Update 24 September, 2015: Orfox BETA is now on Google Play: &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.orfox&#34;&gt;https://play.google.com/store/apps/details?id=info.guardianproject.orfox&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt; &lt;/p&gt;&#xA;&lt;p&gt;In the summer of 2014 (&lt;a href=&#34;https://lists.mayfirst.org/pipermail/guardian-dev/2014-August/003717.html&#34;&gt;https://lists.mayfirst.org/pipermail/guardian-dev/2014-August/003717.html&lt;/a&gt;{.external}), we announced that the results of work by Amogh Pradeep (&lt;a href=&#34;https://github.com/amoghbl1&#34;&gt;https://github.com/amoghbl1&lt;/a&gt;{.external}), our 2014 Google Summer of Code student, has proven we could build Firefox for Android with some of the settings and configurations from the Tor Browser desktop software. We called this app Orfox, in homage to Orbot and our current Orweb browser. This was a good first step, but we were doing the build on Mozilla’s Firefox code repository, and then retrofitting pieces from Tor Browser’s code, which wasn’t the right way to do things, honestly.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building a trustworthy app store that respects privacy</title>
      <link>https://guardianproject.info/2015/06/02/building-a-trustworthy-app-store-that-respects-privacy/</link>
      <pubDate>Tue, 02 Jun 2015 16:38:03 -0400</pubDate>
      <guid>https://guardianproject.info/2015/06/02/building-a-trustworthy-app-store-that-respects-privacy/</guid>
      <description>&lt;p&gt;One core piece of our approach is thinking about very high risk situations, like Ai Weiwei or Edward Snowden, then making the tools for operating under that pressure as easy to use as possible. That means that we might occasionally come across as a little paranoid. It is important to dive into the depths of what might be possible. That is an essential step in evaluating what the risks and defenses are, and how to prioritize them. Making usable software is not just making things easy, but rather making tools for real world situations that are a simple as possible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hiding Apps in Plain Sight</title>
      <link>https://guardianproject.info/2015/05/07/hiding-apps-in-plain-sight/</link>
      <pubDate>Thu, 07 May 2015 09:25:10 -0400</pubDate>
      <guid>https://guardianproject.info/2015/05/07/hiding-apps-in-plain-sight/</guid>
      <description>&lt;p&gt;Beyond just thinking about encryption of data over the wire, or at rest on your mobile device, we also consider physical access to your mobile device, as one of the possible things we need to defend against. Some of our apps, such as Courier, our secure news reader, include a Panic feature, enabling a user to quickly delete data or remove the app, if they fear their device will be taken from them, whether by a friend, family member, criminal or an authority figure. Most recently, with our work on CameraV, our &lt;a href=&#34;https://guardianproject.github.io/informacam-guide/en/InformacamGuide.html&#34;&gt;secure evidence camera app&lt;/a&gt;, we have implemented a few more features that help hide the app and its data, in order to block an unintended person from seeing the photos and videos captured by it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting Android tools into Debian</title>
      <link>https://guardianproject.info/2015/04/30/getting-android-tools-into-debian/</link>
      <pubDate>Thu, 30 Apr 2015 11:13:26 -0400</pubDate>
      <guid>https://guardianproject.info/2015/04/30/getting-android-tools-into-debian/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian-150x150.jpg&#34; alt=&#34;debian&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-12920&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/04/debian-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2015/04/debian-300x300.jpg 300w, https://guardianproject.info/wp-content/uploads/2015/04/debian-270x270.jpg 270w, https://guardianproject.info/wp-content/uploads/2015/04/debian-230x230.jpg 230w, https://guardianproject.info/wp-content/uploads/2015/04/debian.jpg 600w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/04/android.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/04/android-150x150.png&#34; alt=&#34;android&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-12919&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/04/android-150x150.png 150w, https://guardianproject.info/wp-content/uploads/2015/04/android-270x270.png 270w, https://guardianproject.info/wp-content/uploads/2015/04/android-230x230.png 230w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;As part of Debian’s project in Google &lt;a href=&#34;https://wiki.debian.org/SummerOfCode2015&#34; target=&#34;_blank&#34;&gt;Summer of Code&lt;/a&gt;, I’ll be working with two students, Kai-Chung Yan and Komal Sukhani, and another mentor from the &lt;a href=&#34;https://wiki.debian.org/Teams/JavaPackaging&#34; target=&#34;_blank&#34;&gt;Debian Java Team&lt;/a&gt; team, &lt;a href=&#34;https://&amp;#x71;a&amp;#x2e;d&amp;#x65;b&amp;#x69;a&amp;#x6e;.&amp;#x6f;r&amp;#x67;/dev&amp;#x65;l&amp;#x6f;p&amp;#x65;r&amp;#x2e;p&amp;#x68;p&amp;#x3f;l&amp;#x6f;gin=&amp;#x61;p&amp;#x6f;@&amp;#x67;a&amp;#x6d;b&amp;#x61;r&amp;#x75;.&amp;#x64;e&#34; target=&#34;_blank&#34;&gt;Markus Koschany&lt;/a&gt;. We are going to be working on getting the Android SDK and tools into Debian, as part of the Debian &lt;a href=&#34;https://wiki.debian.org/AndroidTools&#34; target=&#34;_blank&#34;&gt;Android Tools&lt;/a&gt; team, building upon the existing work already included from the Java and &lt;a href=&#34;https://wiki.debian.org/Teams/AndroidTools&#34; target=&#34;_blank&#34;&gt;Android Tools&lt;/a&gt; teams. This project is in conjunction with the Java team since there is overlap between Android and Java tools, like &lt;code&gt;gradle&lt;/code&gt;, &lt;code&gt;maven&lt;/code&gt;, etc. Since this work is in Debian, all of the Debian-derivatives will automatically inherit this work. That includes: Ubuntu, Mint, Elementary, and many more.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Phishing for developers</title>
      <link>https://guardianproject.info/2015/02/24/phishing-for-developers/</link>
      <pubDate>Tue, 24 Feb 2015 04:41:29 -0400</pubDate>
      <guid>https://guardianproject.info/2015/02/24/phishing-for-developers/</guid>
      <description>&lt;p&gt;I recently received a very interesting phishing email directed at developers with apps in Google Play. One open question is, how targeted it was: did anyone else get this?&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/File:Trawling_Drawing.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/02/320px-Trawling_Drawing.jpg&#34; alt=&#34;320px-Trawling_Drawing&#34; width=&#34;320&#34; height=&#34;240&#34; class=&#34;alignright size-full wp-image-12873&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/02/320px-Trawling_Drawing.jpg 320w, https://guardianproject.info/wp-content/uploads/2015/02/320px-Trawling_Drawing-300x225.jpg 300w&#34; sizes=&#34;(max-width: 320px) 100vw, 320px&#34; /&gt;&lt;/a&gt;&lt;br&gt;&#xA;It turns out that Google has been recently stepping up enforcement of certain terms, so it looks like some people are taking advantage of that. It is a pretty sophisticated or manually targeted phishing email since they got the name of the app, email address, and project name all correct. The one detail that gives it away is that the &lt;code&gt;From:&lt;/code&gt; address uses the fake domain, even though it would have been possible to send the email using the actual Google account in the &lt;code&gt;From:&lt;/code&gt; field. But this likely would have triggered spam and malware detection algorithms. So they took a subtly different approach by using a real Google address in the &lt;code&gt;Reply-To:&lt;/code&gt;. But they were clever enough to use the same sub-domain, &lt;code&gt;gooogle.com.de&lt;/code&gt;, in the From: address as in the phishing link &lt;code&gt;accounts.gooogle.com.de&lt;/code&gt;, following a Google pattern of subdomains. They also included other real Google links for support and as a “follow up” URL.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Complete, reproducible app distribution achieved!</title>
      <link>https://guardianproject.info/2015/02/11/complete-reproducible-app-distribution-achieved/</link>
      <pubDate>Wed, 11 Feb 2015 14:51:22 -0400</pubDate>
      <guid>https://guardianproject.info/2015/02/11/complete-reproducible-app-distribution-achieved/</guid>
      <description>&lt;p&gt;With &lt;a href=&#34;https://f-droid.org&#34; target=&#34;_blank&#34;&gt;F-Droid&lt;/a&gt;, we have been working towards getting a complete app distribution channel that is able to reproducibly build each Android app from source. while this may sound like a mundane detail, it does provide lots of tangible benefits. First, it means that anyone can verify that the app that they are using is 100% built from the source code, with nothing else added. That verifies that the app is indeed 100% free, open source software.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Experimental app to improve privacy in location sharing</title>
      <link>https://guardianproject.info/2015/01/29/experimental-app-to-improve-privacy-in-location-sharing/</link>
      <pubDate>Thu, 29 Jan 2015 07:36:58 -0400</pubDate>
      <guid>https://guardianproject.info/2015/01/29/experimental-app-to-improve-privacy-in-location-sharing/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web-300x300.png&#34; alt=&#34;ic_launcher-web&#34; width=&#34;300&#34; height=&#34;300&#34; class=&#34;alignright size-medium wp-image-12835&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web-300x300.png 300w, https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web-150x150.png 150w, https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web-270x270.png 270w, https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web-230x230.png 230w, https://guardianproject.info/wp-content/uploads/2015/01/ic_launcher-web.png 512w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;As part of the T2 Panic effort, I’ve recently been diving deep into the issues of sharing location. It is unfortunately looking really bad, with many services, including Google, frequently sharing location as plain text over the network. I’ve started to write up some of the issues &lt;a href=&#34;https://guardianproject.info/tag/panic&#34;&gt;on this blog&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;As part of this, I’ve put together an experimental Android app that aims to act as a privacy filter for all ways of sharing location. Mostly, that means it accepts all sorts of URLs from location services, and tries to parse the location from the URL, then rewrites it into a &lt;a href=&#34;http://geouri.org&#34; target=&#34;_blank&#34;&gt;&lt;code&gt;geo:&lt;/code&gt; URI&lt;/a&gt;, which is the standard way to share location in Android (and hopefully soon all others). As of ChatSecure v14.1.0, these &lt;code&gt;geo:&lt;/code&gt; URLs are also clickable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>First working test of IOCipher for Obj-C</title>
      <link>https://guardianproject.info/2015/01/26/first-working-test-of-iocipher-for-obj-c/</link>
      <pubDate>Mon, 26 Jan 2015 04:32:29 -0400</pubDate>
      <guid>https://guardianproject.info/2015/01/26/first-working-test-of-iocipher-for-obj-c/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/code/iocipher&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg&#34; alt=&#34;alberti cipher disk&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-3079&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk.jpg 245w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;Every so often, we revisit our core libraries in the process of improving our existing apps, and creating new ones. IOCipher has become a standard part of our apps since it provides a really easy way to include encrypted file storage in Android apps. And we are now working on spreading it to iOS as well, headed up by Chris Ballinger, with the first preliminary tests of &lt;a href=&#34;https://github.com/ChatSecure/IOCipher-ObjC&#34; target=&#34;_blank&#34;&gt;IOCipher for Obj-C&lt;/a&gt;. Testing and contributions are most welcome! Find us in our &lt;a href=&#34;https://guardianproject.info/contact/&#34; target=&#34;_blank&#34;&gt;chat room or mailing list&lt;/a&gt; for questions, or just post a comment below! Since the iOS version is based on the exact same core library, libsqlfs, the container files they produce will also be fully compatible with each other.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sharing your location privately</title>
      <link>https://guardianproject.info/2015/01/23/sharing-your-location-privately/</link>
      <pubDate>Fri, 23 Jan 2015 15:00:10 -0400</pubDate>
      <guid>https://guardianproject.info/2015/01/23/sharing-your-location-privately/</guid>
      <description>&lt;div id=&#34;attachment_12774&#34; style=&#34;width: 298px&#34; class=&#34;wp-caption alignright&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2015/01/facebook-messenger-shared-location.png&#34;&gt;&lt;img aria-describedby=&#34;caption-attachment-12774&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2015/01/facebook-messenger-shared-location-576x1024.png&#34; alt=&#34;Facebook location sharing embeds the location in every single message, providing a detailed log to the recipient, Facebook, and anyone Facebook shares that data with&#34; width=&#34;288&#34; height=&#34;512&#34; class=&#34;size-large wp-image-12774&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2015/01/facebook-messenger-shared-location.png 576w, https://guardianproject.info/wp-content/uploads/2015/01/facebook-messenger-shared-location-169x300.png 169w&#34; sizes=&#34;(max-width: 288px) 100vw, 288px&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p id=&#34;caption-attachment-12774&#34; class=&#34;wp-caption-text&#34;&gt;&#xA;    Facebook location sharing embeds the location in every single message, providing a detailed log to the recipient, Facebook, and anyone Facebook shares that data with&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;p&gt;One handy feature that many smartphones give us is the ability to easily share our exact position with other people. You can see this feature in a lot of apps. Google Maps lets you click “Share” and send a URL via any method you have available. In Facebook Messenger, you can click a button and the people on the other side of the chat will receive a little embedded map showing the received location. Of course, the question we always ask is: how can we do this in a privacy-preserving way? And the follow up question: what kinds of information are apps leaking, storing, using, etc? Location is especially valuable and sensitive metadata, especially when there is a lot of it, because it can be used to derive so much information about a person. Most people do not want to publicly post their phone number or home address on the internet, yet are unwittingly giving away far more detailed information by using the various location-based services that are available. There is a lot of specific location information that people do not want to publicize that they visit: a cancer specialist, an abortion clinic, a criminal court, a mistress’ house, or any location information to an abusive spouse. For a great illustration of the power of location metadata, you can watch &lt;a href=&#34;http://www.zeit.de/datenschutz/malte-spitz-data-retention&#34; target=&#34;_blank&#34;&gt;an animation of German politician Malte Spitz’s life, based on his telephone metadata that his telecom had stored&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2015 is the Year of Bore-Sec</title>
      <link>https://guardianproject.info/2015/01/02/2015-is-the-year-of-bore-sec/</link>
      <pubDate>Fri, 02 Jan 2015 12:35:41 -0400</pubDate>
      <guid>https://guardianproject.info/2015/01/02/2015-is-the-year-of-bore-sec/</guid>
      <description>&lt;p&gt;Over the last few months, the Guardian Project team has been thinking about how to approach the next five years of our work. An idea of “security so easy and seamless, that it is boring” came to the surface through some discussions. This led us to look for inspiration in important inventions and innovations of the past, that provide safety and security to all on a day-to-day basis, without the users of these technologies hardly thinking about them. This is no longer about James Bond super-spy technologies, it is about having as little impact on your day-to-day use of mobile technology while still providing the maximum protection to your data and communications, as possible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reducing metadata leakage from software updates</title>
      <link>https://guardianproject.info/2014/10/16/reducing-metadata-leakage-from-software-updates/</link>
      <pubDate>Thu, 16 Oct 2014 12:48:04 -0400</pubDate>
      <guid>https://guardianproject.info/2014/10/16/reducing-metadata-leakage-from-software-updates/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Update&lt;/strong&gt;: now you can &lt;a href=&#34;https://guardianproject.info/2016/07/31/howto-get-all-your-debian-packages-via-tor-onion-services/&#34;&gt;do this with Tor Onion Services&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage-300x199.png&#34; alt=&#34;leakage&#34; width=&#34;300&#34; height=&#34;199&#34; class=&#34;alignright size-medium wp-image-12699&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2014/10/leakage-300x199.png 300w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-100x66.png 100w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-150x99.png 150w, https://guardianproject.info/wp-content/uploads/2014/10/leakage-200x132.png 200w, https://guardianproject.info/wp-content/uploads/2014/10/leakage.png 410w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;Many software update systems use code signing to ensure that only the correct software is downloaded and installed, and to prevent the code from being altered. This is an effective way to prevent the code from being modified, and because of that, software update systems often use plain, unencrypted HTTP connections for downloading code updates. That means that the metadata of what packages a machine has installed is available in plain text for any network observer, from someone sitting on the same public WiFi as you, to state actors with full network observation capabilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CipherKit updates: IOCipher and CacheWord</title>
      <link>https://guardianproject.info/2014/09/26/cipherkit-updates-iocipher-and-cacheword/</link>
      <pubDate>Fri, 26 Sep 2014 21:39:54 -0400</pubDate>
      <guid>https://guardianproject.info/2014/09/26/cipherkit-updates-iocipher-and-cacheword/</guid>
      <description>&lt;p&gt;We’ve been on a big kick recently, updating the newest members of our CipherKit family of frameworks: &lt;a href=&#34;https://guardianproject.info/code/iocipher&#34;&gt;IOCipher&lt;/a&gt; and &lt;a href=&#34;https://github.com/guardianproject/cacheword&#34; target=&#34;_blank&#34;&gt;CacheWord&lt;/a&gt;. There also are is a little news about the original CipherKit framework: &lt;a href=&#34;https://www.zetetic.net/sqlcipher/open-source&#34; title=&#34;SQLCipher for Android&#34; target=&#34;_blank&#34;&gt;SQLCipher-for-Android&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;iocipher-v02&#34;&gt;IOCipher v0.2&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/code/iocipher&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg&#34; alt=&#34;alberti cipher disk&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-3079&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk.jpg 245w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;IOCipher is a library for storing files in an encrypted virtual disk. It’s API is the exact same as &lt;code&gt;java.io&lt;/code&gt; for working with files, and it does not need root access. That makes it the sibling of SQLCipher-for-Android, both are native Android APIs that wrap the SQLCipher database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Question: central server, federated, or p2p? Answer: all!</title>
      <link>https://guardianproject.info/2014/09/18/question-central-server-federated-or-p2p-answer-all/</link>
      <pubDate>Thu, 18 Sep 2014 00:30:57 -0400</pubDate>
      <guid>https://guardianproject.info/2014/09/18/question-central-server-federated-or-p2p-answer-all/</guid>
      <description>&lt;p&gt;There are many ideas of core architectures for providing digital services, each with their own advantages and disadvantages. I break it down along the lines of central servers, federated servers, and peer-to-peer, serverless systems.&lt;/p&gt;&#xA;&lt;div id=&#34;attachment_12631&#34; style=&#34;width: 210px&#34; class=&#34;wp-caption aligncenter&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2014/09/200px-Server-based-network.svg_.png&#34;&gt;&lt;img aria-describedby=&#34;caption-attachment-12631&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2014/09/200px-Server-based-network.svg_.png&#34; alt=&#34;a central service with clients connecting to it&#34; width=&#34;200&#34; height=&#34;207&#34; class=&#34;size-full wp-image-12631&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2014/09/200px-Server-based-network.svg_.png 200w, https://guardianproject.info/wp-content/uploads/2014/09/200px-Server-based-network.svg_-100x103.png 100w, https://guardianproject.info/wp-content/uploads/2014/09/200px-Server-based-network.svg_-150x155.png 150w&#34; sizes=&#34;(max-width: 200px) 100vw, 200px&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p id=&#34;caption-attachment-12631&#34; class=&#34;wp-caption-text&#34;&gt;&#xA;    a central service with clients connecting to it&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;p&gt;Most big internet companies operate in effect as a central server (even though they are implemented differently). There is only facebook.com, there are no other services that can inter-operate with facebook.com. Have a single, central repo makes problems of finding the service and finding people within the service a lot easier. Once you are in Facebook, you just need to know the name of the person you want to contact and you are connected. The Facebook apps just need to talk to facebook.com, so the user does not need to know which service they are using in order to configure the app.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ChatSecure for Android v14 is FINALLY here!</title>
      <link>https://guardianproject.info/2014/09/10/chatsecure-for-android-v14-is-finally-here/</link>
      <pubDate>Wed, 10 Sep 2014 08:35:39 -0400</pubDate>
      <guid>https://guardianproject.info/2014/09/10/chatsecure-for-android-v14-is-finally-here/</guid>
      <description>&lt;p&gt;I am so happy to announce that &lt;strong&gt;ChatSecure for Android v14 IS FINALLY HERE!&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;BUT This is our first “release candidate” of v14 for public use, and while we love it dearly, you may want to wait for 14.0.1 for us to work out any hiccups.&lt;/p&gt;&#xA;&lt;p&gt;The update should be out on Google Play shortly, and FDroid in the next few days. Otherwise, you can always download the APK direct from us:&lt;/p&gt;</description>
    </item>
    <item>
      <title>ChatSecure 13.2: Important Beta!</title>
      <link>https://guardianproject.info/2014/08/05/chatsecure-13.2-important-beta/</link>
      <pubDate>Tue, 05 Aug 2014 11:35:54 -0400</pubDate>
      <guid>https://guardianproject.info/2014/08/05/chatsecure-13.2-important-beta/</guid>
      <description>&lt;p&gt;Today is the first public beta of ChatSecure v13.2, an important update of the user interface, networking code, and overall stability. We’ve spent the last six months tracking down crashes, memory leaks and performance issues, and have reached a stable, functional point which we want to share for public use. Reliability and simplicity our the goals, as we move towards v14 in the next few months.&lt;/p&gt;&#xA;&lt;p&gt;This beta also features a new account setup wizard that we are eager for feedback on. Our goal is to enable new users to have a much simpler experience in setting up ChatSecure to connect to existing or create new accounts. We have also provided a “one-click burner” option to quickly create throwaway accounts, that require Tor and OTR encryption always, for chatting with a single contact or even just a single conversation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introducing TrustedIntents for Android</title>
      <link>https://guardianproject.info/2014/07/30/introducing-trustedintents-for-android/</link>
      <pubDate>Wed, 30 Jul 2014 23:29:23 -0400</pubDate>
      <guid>https://guardianproject.info/2014/07/30/introducing-trustedintents-for-android/</guid>
      <description>&lt;p&gt;Following up on &lt;a href=&#34;https://guardianproject.info/2014/01/21/improving-trust-and-flexibility-in-interactions-between-android-apps/&#34;&gt;our research on secure Intent interactions&lt;/a&gt;, we are now announcing the first working version of the &lt;a href=&#34;https://github.com/guardianproject/TrustedIntents&#34; target=&#34;_blank&#34;&gt;&lt;em&gt;TrustedIntents&lt;/em&gt;&lt;/a&gt; library for Android. It provides methods for checking any Intent for whether the sending and receiving app matches a specified set of trusted app providers. It does this by “pinning” to the signing certificate of the APKs. The developer includes this “pin” in the app, which includes the signing certificate to trust, then &lt;em&gt;TrustedIntents&lt;/em&gt; checks &lt;code&gt;Intent&lt;/code&gt;s against the configured certificate pins. The library includes pins for the Guardian Project and Tor Project signing certificates. It is also easy to generate the pin using our new utility &lt;a href=&#34;https://github.com/guardianproject/checkey&#34; target=&#34;_blank&#34;&gt;Checkey&lt;/a&gt; (available in &lt;a href=&#34;https://guardianproject.info/2014/06/30/new-official-guardian-project-app-repo-for-fdroid/&#34; target=&#34;_blank&#34;&gt;our FDroid repo&lt;/a&gt; and in &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.checkey&#34; target=&#34;_blank&#34;&gt;Google Play&lt;/a&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Official Guardian Project app repo for FDroid!</title>
      <link>https://guardianproject.info/2014/06/30/new-official-guardian-project-app-repo-for-fdroid/</link>
      <pubDate>Mon, 30 Jun 2014 20:26:39 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/30/new-official-guardian-project-app-repo-for-fdroid/</guid>
      <description>&lt;p&gt;We now have an official &lt;a href=&#34;https://f-droid.org&#34; target=&#34;_blank&#34;&gt;FDroid&lt;/a&gt; app repository that is available via three separate methods, to guarantee access to a trusted distribution channel throughout the world! To start with, you must have FDroid installed. Right now, I recommend using the latest test release since it has support for Tor and .onion addresses (earlier versions should work for non-onion addresses):&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://f-droid.org/repo/org.fdroid.fdroid_710.apk&#34;&gt;https://f-droid.org/repo/org.fdroid.fdroid_710.apk&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;In order to add this repo to your FDroid config, you can either click directly on these links on your devices and FDroid will recognize them, or you can click on them on your desktop, and you will be presented with a QR Code to scan. Here are your options:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Recent news on Orweb flaws</title>
      <link>https://guardianproject.info/2014/06/30/recent-news-on-orweb-flaws/</link>
      <pubDate>Mon, 30 Jun 2014 12:43:51 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/30/recent-news-on-orweb-flaws/</guid>
      <description>&lt;p&gt;&lt;strong&gt;August 2014: New browser development news here, including Orfox, our Firefox-based browser solution: &lt;a href=&#34;https://lists.mayfirst.org/pipermail/guardian-dev/2014-August/003717.html&#34;&gt;https://lists.mayfirst.org/pipermail/guardian-dev/2014-August/003717.html&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt; &lt;/p&gt;&#xA;&lt;p&gt;On Saturday, a new post was relased by Xordern entitled &lt;a href=&#34;http://xordern.net/ip-leakage-of-mobile-tor-browsers.html&#34;&gt;IP Leakage of Mobile Tor Browsers&lt;/a&gt;. As the title says, the post documents flaws in mobile browser apps, such as &lt;a href=&#34;https://guardianproject.info/apps/orweb&#34;&gt;Orweb&lt;/a&gt; and &lt;a href=&#34;https://mike.tig.as/onionbrowser/&#34;&gt;Onion Browser&lt;/a&gt;, both which automatically route communication traffic over Tor. While we appreciate the care the author has taken, he does make the mistake of using the term “security” to lump together the need for total anonymity up with the needs of anti-censorship, anti-surveillance, circumvention and local device privacy. We do understand the seriousness of this bug, but at the same time, it is not an issue encountered regularly in the wild.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our first deterministic build: Lil’ Debi 0.4.7</title>
      <link>https://guardianproject.info/2014/06/09/our-first-deterministic-build-lil-debi-0.4.7/</link>
      <pubDate>Mon, 09 Jun 2014 16:41:34 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/09/our-first-deterministic-build-lil-debi-0.4.7/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://abyss.uoregon.edu/~js/ast123/lectures/lec05.html&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2014/06/determinism.gif&#34; alt=&#34;determinism&#34; width=&#34;206&#34; height=&#34;138&#34; class=&#34;alignright size-thumbnail wp-image-12493&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;We just released Lil’ Debi 0.4.7 into the &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.lildebi&#34; target=&#34;_blank&#34;&gt;Play Store&lt;/a&gt; and &lt;a href=&#34;https://f-droid.org/repository/browse/?fdid=info.guardianproject.lildebi&#34; target=&#34;_blank&#34;&gt;f-droid.org&lt;/a&gt;. It is not really different than the 0.4.6 release except in has a new, important property: the APK contents can be reproduced on other machines to the extent that the APK signature can be swapped between the official build and builds that other people have made from source, and this will still be installable. This is known as a “deterministic build” or “reproducible build”: the build process is deterministic, meaning it runs the same way each time, and that results in an APK that is reproducible by others using only the source code. There are some limitations to this, like it has to be built using similar versions of the OpenJDK 1.7 and other build tools, for example. But this process should work on any recent version of Debian or Ubuntu. Please try the process yourself, and let us know if you can verify or not:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot now at v14.0.0 build 100!</title>
      <link>https://guardianproject.info/2014/06/07/orbot-now-at-v14.0.0-build-100/</link>
      <pubDate>Sat, 07 Jun 2014 23:45:17 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/07/orbot-now-at-v14.0.0-build-100/</guid>
      <description>&lt;p&gt;The latest Orbot is out soon on Google Play, and by direct download from the link below:&lt;br&gt;&#xA;Android APK: &lt;a href=&#34;https://guardianproject.info/releases/orbot-latest.apk&#34;&gt;https://guardianproject.info/releases/orbot-latest.apk&lt;/a&gt;&lt;br&gt;&#xA;(&lt;a href=&#34;https://guardianproject.info/releases/orbot-latest.apk.asc&#34;&gt;PGP Sig&lt;/a&gt;)&lt;/p&gt;&#xA;&lt;p&gt;The major improvements for this release are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Uses the latest Tor 0.2.42.22 stable version&lt;/li&gt;&#xA;&lt;li&gt;Fix for recent OpenSSL vulnerabilities&lt;/li&gt;&#xA;&lt;li&gt;Addition of Obfuscated Bridges 3 (Obfs3) support&lt;/li&gt;&#xA;&lt;li&gt;Switch from Privoxy to Polipo (semi-experimental)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;and much more… see the CHANGELOG link below for all the details.&lt;/ul&gt;&lt;/p&gt;&#xA;&lt;p&gt;The tag commit message was “updating to 14.0.0 build 100!”&lt;br&gt;&#xA;&lt;a href=&#34;https://gitweb.torproject.org/orbot.git/commit/81bd61764c2c300bd1ba1e4de5b03350455470c1&#34;&gt;https://gitweb.torproject.org/orbot.git/commit/81bd61764c2c300bd1ba1e4de5b03350455470c1&lt;br&gt;&#xA;&lt;/a&gt;&lt;br&gt;&#xA;and the full CHANGELOG is here: &lt;a href=&#34;https://gitweb.torproject.org/orbot.git/blob_plain/81bd61764c2c300bd1ba1e4de5b03350455470c1:/CHANGELOG&#34;&gt;https://gitweb.torproject.org/orbot.git/blob_plain/81bd61764c2c300bd1ba1e4de5b03350455470c1:/CHANGELOG&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Automatic, private distribution of our test builds</title>
      <link>https://guardianproject.info/2014/06/06/automatic-private-distribution-of-our-test-builds/</link>
      <pubDate>Fri, 06 Jun 2014 17:17:01 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/06/automatic-private-distribution-of-our-test-builds/</guid>
      <description>&lt;p&gt;One thing we are very lucky to have is a good community of people willing to test out unfinished builds of our software. That is a very valuable contribution to the process of developing usable, secure apps. So we want to make this process as easy as possible while keeping it as secure and private as possible. To that end, we have set up an &lt;a href=&#34;https://f-droid.org&#34; target=&#34;_blank&#34;&gt;FDroid&lt;/a&gt; repository of apps generated from the test builds that our build server generates automatically every time we publish new code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reset The Net!</title>
      <link>https://guardianproject.info/2014/06/04/reset-the-net/</link>
      <pubDate>Wed, 04 Jun 2014 19:07:14 -0400</pubDate>
      <guid>https://guardianproject.info/2014/06/04/reset-the-net/</guid>
      <description>&lt;p&gt;We’re making the Internet more secure, by taking part in #ResetTheNet &lt;a href=&#34;https://resetthenet.org&#34;&gt;https://resetthenet.org&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security in a thumb drive: the promise and pain of hardware security modules, take one!</title>
      <link>https://guardianproject.info/2014/03/28/security-in-a-thumb-drive-the-promise-and-pain-of-hardware-security-modules-take-one/</link>
      <pubDate>Fri, 28 Mar 2014 16:54:39 -0400</pubDate>
      <guid>https://guardianproject.info/2014/03/28/security-in-a-thumb-drive-the-promise-and-pain-of-hardware-security-modules-take-one/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software.jpg&#34; alt=&#34;security in a thumb drive&#34; width=&#34;219&#34; height=&#34;119&#34; class=&#34;alignleft size-full wp-image-12311&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software.jpg 219w, https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software-100x54.jpg 100w, https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software-150x81.jpg 150w, https://guardianproject.info/wp-content/uploads/2014/03/cryptostick-usb-flash-drive-security-software-200x108.jpg 200w&#34; sizes=&#34;(max-width: 219px) 100vw, 219px&#34; /&gt;&lt;/a&gt;Hardware Security Modules (aka Smartcards, chipcards, etc) provide a secure way to store and use cryptographic keys, while actually making the whole process a bit easier. In theory, one USB thumb drive like thing could manage all of the crypto keys you use in a way that makes them much harder to steal. That is the promise. The reality is that the world of Hardware Security Modules (HSMs) is a massive, scary minefield of endless technical gotchas, byzantine standards (PKCS#11!), technobabble, and incompatibilities. Before I dive too much into ranting about the days of my life wasted trying to find a clear path through this minefield, I’m going to tell you about one path I did find through to solve a key piece of the puzzle: Android and Java package signing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Eric Schmidt Awards Guardian Project a “New Digital Age” Grant</title>
      <link>https://guardianproject.info/2014/03/10/eric-schmidt-awards-guardian-project-a-new-digital-age-grant/</link>
      <pubDate>Mon, 10 Mar 2014 12:22:34 -0400</pubDate>
      <guid>https://guardianproject.info/2014/03/10/eric-schmidt-awards-guardian-project-a-new-digital-age-grant/</guid>
      <description>&lt;p&gt;An interesting turn of events (which we are very grateful for!)&lt;/p&gt;&#xA;&lt;p&gt;*&lt;strong&gt;*&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;FOR IMMEDIATE RELEASE&lt;br&gt;&#xA;Diana Del Olmo, &lt;a href=&#34;mailto:diana@guardianproject.info&#34;&gt;diana@guardianproject.info&lt;/a&gt;&lt;br&gt;&#xA;Nathan Freitas (in Austin / SXSW) +1.718.569.7272&lt;br&gt;&#xA;&lt;a href=&#34;mailto:nathan@guardianproject.info&#34;&gt;nathan@guardianproject.info&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Get press kit and more at: &lt;a href=&#34;https://guardianproject.info/press&#34;&gt;https://guardianproject.info/press&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Permalink:&lt;br&gt;&#xA;&lt;a href=&#34;https://docs.google.com/document/d/1kI6dV6nPSd1z3MkxSTMRT8P9DcFQ9uOiNFcUlGTjjXA/edit?usp=sharing&#34;&gt;https://docs.google.com/document/d/1kI6dV6nPSd1z3MkxSTMRT8P9DcFQ9uOiNFcUlGTjjXA/edit?usp=sharing&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;GOOGLE EXECUTIVE CHAIRMAN ERIC SCHMIDT AWARDS GUARDIAN PROJECT A “NEW DIGITAL AGE” GRANT&lt;/p&gt;&#xA;&lt;p&gt;The Guardian Project is amongst the 10 chosen grantee organizations to be awarded a $100,000 digital age grant due to its extensive work creating open source software to help citizens overcome government-sponsored censorship.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tweaking HTTPS for Better Security</title>
      <link>https://guardianproject.info/2014/02/12/tweaking-https-for-better-security/</link>
      <pubDate>Wed, 12 Feb 2014 19:14:59 -0400</pubDate>
      <guid>https://guardianproject.info/2014/02/12/tweaking-https-for-better-security/</guid>
      <description>&lt;p&gt;The HTTPS protocol is based on TLS and SSL, which are standard ways to negotiate encrypted connections. There is a lot of complexity in the protocols and lots of config options, but luckily most of the config options can be ignored since the defaults are fine. But there are some things worth tweaking to ensure that as many connections as possible are using reliable encryption ciphers while providing &lt;a href=&#34;https://en.wikipedia.org/wiki/Forward_secrecy&#34;&gt;forward secrecy&lt;/a&gt;. A connection with forward secrecy provides protection to past transactions even if the server’s HTTPS private key/certificate is stolen or compromised. This protects your users from large scale network observers that can store all traffic for later decryption, like governments, ISPs, telecoms, etc. From the server operator’s point of view, it means less risk of leaking users’ data, since even if the server is compromised, past network traffic will probably not be able to be encrypted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Improving trust and flexibility in interactions between Android apps</title>
      <link>https://guardianproject.info/2014/01/21/improving-trust-and-flexibility-in-interactions-between-android-apps/</link>
      <pubDate>Tue, 21 Jan 2014 13:51:57 -0400</pubDate>
      <guid>https://guardianproject.info/2014/01/21/improving-trust-and-flexibility-in-interactions-between-android-apps/</guid>
      <description>&lt;div id=&#34;attachment_12240&#34; style=&#34;width: 310px&#34; class=&#34;wp-caption alignright&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2014/01/Android-Intents.png&#34;&gt;&lt;img aria-describedby=&#34;caption-attachment-12240&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2014/01/Android-Intents-300x61.png&#34; alt=&#34;Activity1 sending an Intent that either Activity2 or Activity3 can handle.&#34; width=&#34;300&#34; height=&#34;61&#34; class=&#34;size-medium wp-image-12240&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2014/01/Android-Intents-300x61.png 300w, https://guardianproject.info/wp-content/uploads/2014/01/Android-Intents.png 600w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p id=&#34;caption-attachment-12240&#34; class=&#34;wp-caption-text&#34;&gt;&#xA;    &lt;code&gt;Activity1&lt;/code&gt; sending an &lt;code&gt;Intent&lt;/code&gt; that either &lt;code&gt;Activity2&lt;/code&gt; or &lt;code&gt;Activity3&lt;/code&gt; can handle.&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;Android provides a flexible system of messaging between apps in the form of &#xA;&lt;p&gt;&lt;code&gt;&amp;lt;a href=&amp;quot;https://developer.android.com/guide/components/intents-filters.html&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;Intent&amp;lt;/a&amp;gt;&lt;/code&gt;s. It also provides the framework for reusing large chunks of apps based on the &lt;code&gt;&amp;lt;a href=&amp;quot;https://developer.android.com/reference/android/app/Activity.html&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;Activity&amp;lt;/a&amp;gt;&lt;/code&gt; class. &lt;code&gt;Intent&lt;/code&gt;s are the messages that make the requests, and &lt;code&gt;Activity&lt;/code&gt;s are the basic chunk of functionality in an app, including its interface. This combination allows apps to reuse large chunks of functionality while keeping the user experience seamless and fluent. For example, an app can send an Intent to request a camera &lt;code&gt;Activity&lt;/code&gt; to prompt the user to take a picture, and that process can feel integrated into the original app that made the request. Another common use of this paradigm is choosing account information from the contacts database (aka the &lt;em&gt;People&lt;/em&gt; app). When a user is composing an new email, they will want to select who the message gets sent to. Android provides both the contacts database, and a nice overlay screen for finding and selecting the person to send to. This combination is an &lt;code&gt;Activity&lt;/code&gt; provided by Android. The message that the email program sends in order to trigger that &lt;code&gt;Activity&lt;/code&gt; is an &lt;code&gt;Intent&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Four Ways InformaCam Powers Mobile Media Verification</title>
      <link>https://guardianproject.info/2014/01/06/four-ways-informacam-powers-mobile-media-verification/</link>
      <pubDate>Mon, 06 Jan 2014 15:14:16 -0400</pubDate>
      <guid>https://guardianproject.info/2014/01/06/four-ways-informacam-powers-mobile-media-verification/</guid>
      <description>&lt;p&gt;_Note: A big discussion topic of 2013 was about how hard cryptography and security is for average people, journalists and others. With that in mind, we’d like to sub-title this post “Making Mobile Crypto Easy for Eyewitnesses”, as the InformaCam software and process described below includes the full gamut of security and cryptography tools all behind a streamlined, and even attractive application user experience we are quite proud of…. _&lt;/p&gt;&#xA;&lt;p&gt;One of the primary goals of the &lt;a href=&#34;https://guardianproject.info/informa&#34;&gt;InformaCam&lt;/a&gt; project (now in &lt;a href=&#34;https://guardianproject.info/informa&#34;&gt;public beta!&lt;/a&gt;) is to create an environment where, when it comes to photos and video captured on smartphones, people and organizations can trust what they see. Faked photos and videos, whether intended to be humorous or malicious, are all too common online, especially in times of crisis. Thus, the software that been developed works to ensure the full, complete original photo or video captured of an event, can safely reach the people who need to see it, without it first being filtered, modified, cropped, trimmed or otherwise manipulated.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Integrating Crypto Identities with Android</title>
      <link>https://guardianproject.info/2013/12/28/integrating-crypto-identities-with-android/</link>
      <pubDate>Sat, 28 Dec 2013 19:42:56 -0400</pubDate>
      <guid>https://guardianproject.info/2013/12/28/integrating-crypto-identities-with-android/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Alberti_cipher_disk&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg&#34; alt=&#34;alberti cipher disk&#34; width=&#34;50&#34; height=&#34;50&#34; class=&#34;alignleft size-thumbnail wp-image-3079&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk-150x150.jpg 150w, https://guardianproject.info/wp-content/uploads/2012/10/alberti_cipher_disk.jpg 245w&#34; sizes=&#34;(max-width: 50px) 100vw, 50px&#34; /&gt;&lt;/a&gt;ver the past couple of years, Android has included a central database for managing information about people, it is known as the &lt;a href=&#34;https://developer.android.com/reference/android/provider/ContactsContract.html&#34; target=&#34;_blank&#34;&gt;&lt;code&gt;ContactsContract&lt;/code&gt;&lt;/a&gt; (that’s a mouthful). Android then provides the &lt;em&gt;People&lt;/em&gt; app and reusable interface chunks to choose contacts that work with all the information in the &lt;code&gt;ContactsContract&lt;/code&gt; database. Any time that you are adding an account in the &lt;em&gt;Settings&lt;/em&gt; app, you are setting up this integration. You can see it with Google services, &lt;em&gt;Skype&lt;/em&gt;, &lt;em&gt;Facebook&lt;/em&gt;, and many more. This system has a lot of advantages, including:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Keys, signatures, certificates, verifications, etc. What are all these for?</title>
      <link>https://guardianproject.info/2013/12/12/keys-signatures-certificates-verifications-etc.-what-are-all-these-for/</link>
      <pubDate>Thu, 12 Dec 2013 13:20:09 -0400</pubDate>
      <guid>https://guardianproject.info/2013/12/12/keys-signatures-certificates-verifications-etc.-what-are-all-these-for/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2013/12/key.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2013/12/key-150x150.jpg&#34; alt=&#34;portable shared security token&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-12129&#34; /&gt;&lt;/a&gt;For the past two years, we have been thinking about how to make it easier for anyone to achieve private communications. One particular focus has been on the “security tokens” that are required to make private communications systems work. This research area is called internally &lt;a href=&#34;https://dev.guardianproject.info/projects/psst/wiki/PSST&#34; title=&#34;PSST Wiki&#34; target=&#34;_blank&#34;&gt;Portable Shared Security Tokens aka PSST&lt;/a&gt;. All of the privacy tools that we are working on require “keys” and “signatures”, to use the language of cryptography, and these are the core of what “security tokens” are. One thing we learned a lot about is how to portray and discuss tools for private or anonymous communications to people who just want to communicate and are not interested in technical discussion. This is becoming a central issue among a lot of people working to make usable privacy tools.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQLCipher has 100M&#43; Mobile Users (Thanks to WeChat!)</title>
      <link>https://guardianproject.info/2013/12/10/sqlcipher-has-100m-mobile-users-thanks-to-wechat/</link>
      <pubDate>Tue, 10 Dec 2013 16:38:02 -0400</pubDate>
      <guid>https://guardianproject.info/2013/12/10/sqlcipher-has-100m-mobile-users-thanks-to-wechat/</guid>
      <description>&lt;p&gt;&lt;em&gt;(Note: Originally this post had a title claiming 300 Million WeChat users… that would have included iOS and Android, and we don’t know if the WeChat iOS app also includes SQLCipher encryption or not. That said, there are 50-100M Google Play downloads of WeChat for Android, which does not include all of the users inside China)&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Through some of our own recent sluething, &lt;a href=&#34;http://citizenlab.org&#34;&gt;Citizen Lab’s&lt;/a&gt; research into &lt;a href=&#34;https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/&#34;&gt;“Asia Chats” security&lt;/a&gt;, and now via this &lt;a href=&#34;http://blog.emaze.net/2013/09/a-look-at-wechat-security.html&#34;&gt;detailed look at WeChat security from Emaze.com&lt;/a&gt;, it has been recently discovered that &lt;a href=&#34;http://www.wechat.com/&#34;&gt;WeChat for Android&lt;/a&gt; uses &lt;a href=&#34;https://www.zetetic.net/sqlcipher&#34;&gt;SQLCipher&lt;/a&gt; for local data encryption in its app. We co-developed SQLCipher for Android with &lt;a href=&#34;http://zetetic.net/&#34;&gt;Zetetic&lt;/a&gt;, and have been working to promote its adoption among Android developers who need to protect data stored locally on a device. While many people would point to Android’s Full Disk Encryption feature as a solution for that, only a small percentage of users ever enable it, and even then, once a device is unlocked, then all data is accessible by someone looking to extract it. With SQLCipher, the application can ensure its own data is encrypted, and if the app is closed, then the data is secured.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting keys into your keyring with Gnu Privacy Guard for Android</title>
      <link>https://guardianproject.info/2013/12/06/getting-keys-into-your-keyring-with-gnu-privacy-guard-for-android/</link>
      <pubDate>Fri, 06 Dec 2013 15:11:53 -0400</pubDate>
      <guid>https://guardianproject.info/2013/12/06/getting-keys-into-your-keyring-with-gnu-privacy-guard-for-android/</guid>
      <description>&lt;p&gt;Now that you can have a full &lt;a href=&#34;https://www.gnupg.org&#34; target=&#34;_blank&#34;&gt;&lt;em&gt;GnuPG&lt;/em&gt;&lt;/a&gt; on your Android device with &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.gpg&#34; target=&#34;_blank&#34;&gt;&lt;em&gt;Gnu Privacy Guard&lt;/em&gt;&lt;/a&gt; for Android, the next step is getting keys you need onto your device and included in &lt;em&gt;Gnu Privacy Guard&lt;/em&gt;. We have tried to make it as easy as possible without compromising privacy, and have implemented a few approaches, while working on others. There are a few ways to get this done right now.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Gnu Privacy Guard&lt;/em&gt; registered itself with Android as a handler of all the standard &lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc3156.txt&#34; title=&#34;RFC3156: MIME Security with OpenPGP&#34; target=&#34;_blank&#34;&gt;OpenPGP MIME types&lt;/a&gt; (&lt;code&gt;application/pgp-keys&lt;/code&gt;, &lt;code&gt;application/pgp-encrypted&lt;/code&gt;, &lt;code&gt;application/pgp-signature&lt;/code&gt;), as well as all of the OpenPGP and GnuPG file extensions (&lt;code&gt;.pkr&lt;/code&gt; &lt;code&gt;.skr&lt;/code&gt; &lt;code&gt;.key&lt;/code&gt; &lt;code&gt;.sig&lt;/code&gt; &lt;code&gt;.asc&lt;/code&gt; &lt;code&gt;.gpg&lt;/code&gt; &lt;code&gt;.bin&lt;/code&gt;). This means that users just have to share a file to &lt;em&gt;Gnu Privacy Guard&lt;/em&gt; using any of the standard Android methods, these files can be launched from an email attachment, opened from the SD card using a file browser, clicked in the Downloads view, etc.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ostel.co secure VoIP network partners with Open Hosting</title>
      <link>https://guardianproject.info/2013/12/03/ostel.co-secure-voip-network-partners-with-open-hosting/</link>
      <pubDate>Tue, 03 Dec 2013 17:56:18 -0400</pubDate>
      <guid>https://guardianproject.info/2013/12/03/ostel.co-secure-voip-network-partners-with-open-hosting/</guid>
      <description>&lt;p&gt;Ostel.co began as a R&amp;amp;D effort sponsored by The Guardian Project. The question: Is a peer-to-peer secure voice and video call network possible to build with open Internet standards and Open Source software? After two years and tens of thousands of users later, the answer is a resounding YES!&lt;/p&gt;&#xA;&lt;p&gt;Two of the crucial components of any standards based VoIP service are infrastructure to route calls and a database to locate end users. &lt;a href=&#34;http://openhosting.com/&#34;&gt;Open Hosting’s&lt;/a&gt; service was a perfect fit, so we’ve teamed up for ongoing support of ostel.co. Open Hosting has a high speed, low-latency network in the southern USA, which hosts the backend to route calls over the ostel.co domain. It also has a clearly defined, concise &lt;a href=&#34;http://openhosting.com/about-us/legal/&#34;&gt;Privacy Policy and Terms of Service&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>VoIP security architecture in brief</title>
      <link>https://guardianproject.info/2013/11/21/voip-security-architecture-in-brief/</link>
      <pubDate>Thu, 21 Nov 2013 19:07:17 -0400</pubDate>
      <guid>https://guardianproject.info/2013/11/21/voip-security-architecture-in-brief/</guid>
      <description>&lt;p&gt;Voice over IP (VoIP) has been around for a long time. It’s ubiquitous in homes, data centers and carrier networks. Despite this ubiquity, security is rarely a priority. With the combination of a handful of important standard protocols, it is possible to make untappable end to end encryption for an established VoIP call.&lt;/p&gt;&#xA;&lt;p&gt;TLS is the security protocol between the signaling endpoints of the session. It’s the same technology that exists for SSL web sites; ecommerce, secure webmail, Tor and many others use TLS for security. Unlike web sites, VoIP uses a different protocol called the Session Initiation Protocol (SIP) for signaling: actions like ringing an endpoint, answering a call and hanging up. This is the metadata of calls. SIP-TLS uses the standard Certificate Authorities for key agreement. This implies trust between the certificate issuer and the calling endpoints.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A tag-team git workflow that incorporates auditing</title>
      <link>https://guardianproject.info/2013/11/21/a-tag-team-git-workflow-that-incorporates-auditing/</link>
      <pubDate>Thu, 21 Nov 2013 14:03:22 -0400</pubDate>
      <guid>https://guardianproject.info/2013/11/21/a-tag-team-git-workflow-that-incorporates-auditing/</guid>
      <description>&lt;p&gt;Git is as wonderful as it is terrible, it is immensly flexible but also far from intuitive. So to make our lives easier, we try to use git as it was originally intended, as a toolkit for building workflows.&lt;/p&gt;&#xA;&lt;div id=&#34;attachment_11990&#34; style=&#34;width: 310px&#34; class=&#34;wp-caption alignright&#34;&gt;&#xA;  &lt;a href=&#34;http://git-scm.com/book/en/Distributed-Git-Distributed-Workflows#Integration-Manager-Workflow&#34;&gt;&lt;img aria-describedby=&#34;caption-attachment-11990&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2013/11/integration_manager_workflow-300x121.png&#34; alt=&#34;Integration-Manager Workflow&#34; width=&#34;300&#34; height=&#34;121&#34; class=&#34;size-medium wp-image-11990&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2013/11/integration_manager_workflow-300x121.png 300w, https://guardianproject.info/wp-content/uploads/2013/11/integration_manager_workflow.png 500w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p id=&#34;caption-attachment-11990&#34; class=&#34;wp-caption-text&#34;&gt;&#xA;    Integration-Manager Workflow&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;We use a simple version of the “&#xA;&lt;p&gt;&lt;a href=&#34;http://git-scm.com/book/en/Distributed-Git-Distributed-Workflows&#34; target=&#34;_blank&#34;&gt;Integration-Manager Workflow&lt;/a&gt;“. One key difference is that we often have multiple contributors acting as the integration manager. This means that there is always someone else besides the original author reviewing each commit. For example: I make a commit and push it to my public developer’s repo. I ask Abel to review my commit, and if he agrees with it, he then pushes it to the official public “&lt;em&gt;upstream&lt;/em&gt;” repo (aka “blessed repository”). And since git will tell us if a remote repo is different than our local repo, this process makes it harder for an attacker to slip a commit into our remote repo without us noticing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Turn Your Device Into an App Store</title>
      <link>https://guardianproject.info/2013/11/18/turn-your-device-into-an-app-store/</link>
      <pubDate>Mon, 18 Nov 2013 16:27:30 -0400</pubDate>
      <guid>https://guardianproject.info/2013/11/18/turn-your-device-into-an-app-store/</guid>
      <description>&lt;p&gt;As we’ve touched upon in &lt;a href=&#34;https://guardianproject.info/2013/11/05/setting-up-your-own-app-store-with-f-droid/&#34;&gt;previous blog posts &lt;/a&gt; the Google Play model of application distribution has some disadvantages. Google does not make the Play store universally available, instead limiting availability to a subset of countries. Using the Play store to install apps necessitates both sharing personal information with Google and enabling Google to remotely remove apps from your device (colloquially referred to as &lt;a href=&#34;http://www.engadget.com/2008/10/16/google-implemented-an-android-kill-switch-those-rascals/&#34;&gt;having a ‘kill switch’&lt;/a&gt;). Using the Play store also requires a functional data connection (wifi or otherwise) to allow apps to be downloaded. Often there is a need to quickly bootstrap users during training sessions in countries with unreliable/restricted data connectivity, or in extreme cases, &lt;a href=&#34;http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html?_r=0&#34;&gt;no internet connectivity at all&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Your own private dropbox with free software</title>
      <link>https://guardianproject.info/2013/11/12/your-own-private-dropbox-with-free-software/</link>
      <pubDate>Tue, 12 Nov 2013 12:50:23 -0400</pubDate>
      <guid>https://guardianproject.info/2013/11/12/your-own-private-dropbox-with-free-software/</guid>
      <description>&lt;p&gt;There are lots of file storage and sharing software packages out there that make it easy for a group of people to share files. Dropbox is perhaps the most well known of the group, it provides an easy way for a group of people to share files. The downside of Dropbox is that it is not a private service, just like any cloud-based service. Dropbox has total access to your files that you store there. That means its likely that the NSA and its collaborators do too.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Setting up your own app store with F-Droid</title>
      <link>https://guardianproject.info/2013/11/05/setting-up-your-own-app-store-with-f-droid/</link>
      <pubDate>Tue, 05 Nov 2013 11:55:43 -0400</pubDate>
      <guid>https://guardianproject.info/2013/11/05/setting-up-your-own-app-store-with-f-droid/</guid>
      <description>&lt;p&gt;(&lt;em&gt;This blog post as now been cooked into an &lt;a href=&#34;https://f-droid.org/wiki/page/Setup_an_FDroid_App_Repo&#34; target=&#34;_blank&#34;&gt;updated HOWTO&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;&#xA;&lt;p&gt;The Google Play Store for Android is not available in all parts of the world, US law restricts its use in certain countries like Iran, and many countries block access to the Play Store, like China. Also, the Google Play Store tracks all user actions, reporting back to Google what apps have been installed and also run on the phone. Because of the NSA leaks, we’re seeing that governments are &lt;a href=&#34;http://www.theguardian.com/technology/2013/oct/30/google-reports-nsa-secretly-intercepts-data-links&#34; target=&#34;_blank&#34;&gt;actively tapping&lt;/a&gt; into &lt;a href=&#34;http://www.nytimes.com/2013/10/31/technology/nsa-is-mining-google-and-yahoo-abroad.html&#34; target=&#34;_blank&#34;&gt;the raw data streams&lt;/a&gt; of Google, Yahoo, and others. So that means the information the Google Play Store sends back to Google is also intercepted by the NSA (and probably other country’s agencies), and that information is shared with other governments. In other words, your activity on the Google Play Store is far from private. Lastly, the Google Play Store is not free software, unlike the core of Android itself. It is proprietary software that Google entirely controls.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Issues when distributing software</title>
      <link>https://guardianproject.info/2013/10/31/issues-when-distributing-software/</link>
      <pubDate>Thu, 31 Oct 2013 15:51:19 -0400</pubDate>
      <guid>https://guardianproject.info/2013/10/31/issues-when-distributing-software/</guid>
      <description>&lt;p&gt;There is currently a &lt;a href=&#34;http://lists.debian.org/debian-security/2013/10/msg00027.html&#34; target=&#34;_blank&#34;&gt;discussion underway on the Debian-security list&lt;/a&gt; about adding TLS and Tor functionality to the official repositories (repos) of Debian packages that is highlighting how we need to update how we think about the risks when distributing software. Mostly, we are used to thinking about making sure that the software that the user is installing is the same exact software that has been posted for distribution. This is generally handled by signing the software package, then verifying that signature on the user’s machine. This is how it works on Mac OS X, Windows, Debian, etc. etc.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ChatSecure v12 Provides Comprehensive Mobile Security and a Whole New Look</title>
      <link>https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-mobile-security-and-a-whole-new-look/</link>
      <pubDate>Thu, 24 Oct 2013 01:50:13 -0400</pubDate>
      <guid>https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-mobile-security-and-a-whole-new-look/</guid>
      <description>&lt;p dir=&#34;ltr&#34;&gt;&#xA;  &lt;strong&gt;ChatSecure v12 Provides Comprehensive Mobile Security and a Whole New Look&lt;/strong&gt;&lt;strong&gt;&lt;span style=&#34;font-size: 13px;&#34;&gt;&lt;br /&gt; &lt;/span&gt;&lt;/strong&gt;&#xA;&lt;/p&gt;&#xA;&lt;p dir=&#34;ltr&#34;&gt;&#xA;  &lt;span style=&#34;font-size: 13px;&#34;&gt;The Guardian Project’s award-winning open-source app “Gibberbot” for Android, has been rebranded to “ChatSecure” for its version 12 release, unifying the branding with the iPhone and iPad apps, while offering major updates in security from the device through the network.&lt;/span&gt;&#xA;&lt;/p&gt;&#xA;&lt;p dir=&#34;ltr&#34;&gt;&#xA;  &lt;em&gt;&lt;strong&gt;Download on &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im&#34;&gt;Google Play&lt;/a&gt; or &lt;a href=&#34;https://guardianproject.info/releases/chatsecure-latest.apk&#34;&gt;Direct Download&lt;/a&gt; now.&lt;/strong&gt;&lt;/em&gt;&#xA;&lt;/p&gt;&#xA;&lt;p dir=&#34;ltr&#34;&gt;&#xA;  &lt;span style=&#34;font-size: 13px;&#34;&gt;October 20, New York, NY – The Guardian Project, a New York-based open-source mobile security incubator, has launched version 12 of its well-regarded secure messaging app for Android, rebranding it to “ChatSecure” to unify branding with existing open-source iPhone and iPad apps. The new upgrade brings an entirely new fluid user interface, and unprecedented security features for users looking to protect their message content (what they are saying) and their metadata (who, why and where) from malicious adversaries and apps, hostile network operators, and dragnet surveillance. It is completely open-source, utilizes interoperable protocols, and has undergone third-party security audits and code reviews.&lt;/span&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Office Hours Every Friday This Fall</title>
      <link>https://guardianproject.info/2013/10/16/open-office-hours-every-friday-this-fall/</link>
      <pubDate>Wed, 16 Oct 2013 16:51:36 -0400</pubDate>
      <guid>https://guardianproject.info/2013/10/16/open-office-hours-every-friday-this-fall/</guid>
      <description>&lt;div&gt;&#xA;  &lt;strong&gt;Fri, Oct 18, 1:00 PM EDT – 3:00 PM&lt;/strong&gt;&lt;/p&gt; &#xA;  &lt;div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&lt;div&gt;&#xA;  &lt;div&gt;&#xA;    &lt;div&gt;&#xA;      &lt;div&gt;&#xA;        &lt;div&gt;&#xA;          Members of the Guardian Project will be hosting &lt;a href=&#34;https://plus.google.com/events/cumq8tucoc31ap55iqdn7pq9abs&#34;&gt;weekly public hangouts&lt;/a&gt; every Friday for the rest of year to answer questions about our apps (Orbot, Orweb, ChatSecure), building on our mobile security libraries (IOCipher, SQLCipher, NetCipher) and using services like OStel (including how to run your own secure phone service!).&lt;/p&gt; &#xA;&lt;pre&gt;&lt;code&gt;      &amp;lt;p&amp;gt;&#xA;        We will also be live in IRC on Freenode at &amp;lt;a href=&amp;quot;https://plus.google.com/s/%23guardianproject&amp;quot;&amp;gt;#guardianproject&amp;lt;/a&amp;gt;  as always for those of you who don’t feel the need to be on camera.&#xA;      &amp;lt;/p&amp;gt;&#xA;      &#xA;      &amp;lt;p&amp;gt;&#xA;        Sound fun? You betcha it will be. This will be the &amp;lt;b&amp;gt;first&amp;lt;/b&amp;gt; event on Friday, so please come and join. &amp;lt;a href=&amp;quot;https://guardianproject.info/&amp;quot; rel=&amp;quot;nofollow&amp;quot;&amp;gt;https://guardianproject.info&amp;lt;/a&amp;gt;&#xA;      &amp;lt;/p&amp;gt;&#xA;    &amp;lt;/div&amp;gt;&#xA;    &#xA;    &amp;lt;div&amp;gt;&#xA;      For EU, Africa, Asia: We’ll have some early sessions in the coming weeks. This is just our first test run. Thanks for understanding!&#xA;    &amp;lt;/div&amp;gt;&#xA;    &#xA;    &amp;lt;div&amp;gt;&#xA;    &amp;lt;/div&amp;gt;&#xA;    &#xA;    &amp;lt;div&amp;gt;&#xA;      &amp;lt;strong&amp;gt;Fri, Oct 18, 1:00 PM EDT – 3:00 PM&amp;lt;/strong&amp;gt;&#xA;    &amp;lt;/div&amp;gt;&#xA;    &#xA;    &amp;lt;div&amp;gt;&#xA;      RSVP the Google+ Event today: &amp;lt;a href=&amp;quot;https://plus.google.com/events/cumq8tucoc31ap55iqdn7pq9abs&amp;quot;&amp;gt;https://plus.google.com/events/cumq8tucoc31ap55iqdn7pq9abs&amp;lt;/a&amp;gt; or we’ll just see you on IRC.&#xA;    &amp;lt;/div&amp;gt;&#xA;  &amp;lt;/div&amp;gt;&#xA;&amp;lt;/div&amp;gt;&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;</description>
    </item>
    <item>
      <title>Gibberbot’s “ChatSecure” MakeOver: Almost Done!</title>
      <link>https://guardianproject.info/2013/09/20/gibberbots-chatsecure-makeover-almost-done/</link>
      <pubDate>Fri, 20 Sep 2013 17:19:54 -0400</pubDate>
      <guid>https://guardianproject.info/2013/09/20/gibberbots-chatsecure-makeover-almost-done/</guid>
      <description>&lt;p&gt;In a previous post with the mouthful of a title &lt;a href=&#34;https://guardianproject.info/2013/07/16/modernizing-expectations-for-the-nouveau-secure-mobile-messaging-movement/&#34;&gt;“Modernizing Expectations for the Nouveau Secure Mobile Messaging Movement”&lt;/a&gt;, I spoke about all of the necessary security features a modern mobile messaging app should have. These include encrypted local storage, end-to-end verifiable encryption over the network, certificate pinning for server connections and a variety of other features. I am VERY happy to report that the latest v12 beta release of the project formerly known as Gibberbot, now called ChatSecure, has all of the features described in that post implemented. From a feature perspective, it is the most security mobile messaging app ever. We also hope that in reality, in practice, it also is, as we have spent a great deal of effort on security code audits, penetration testing, and responding to the outcomes of those effort, to further harden our app.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Keeping data private means it must be truly deletable!</title>
      <link>https://guardianproject.info/2013/08/23/keeping-data-private-means-it-must-be-truly-deletable/</link>
      <pubDate>Fri, 23 Aug 2013 17:36:49 -0400</pubDate>
      <guid>https://guardianproject.info/2013/08/23/keeping-data-private-means-it-must-be-truly-deletable/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2013/08/erase-hard-drive.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2013/08/erase-hard-drive-150x150.jpg&#34; alt=&#34;deleting data&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignright size-thumbnail wp-image-11598&#34; /&gt;&lt;/a&gt;There are lots of apps these days that promise to keep your data secure, and even some that promise to wipe away private information mere seconds or minutes after it has been received. It is one thing to keep data out of view from people you don’t want seeing it, it is also important to be able to truly delete information. Unfortunately computers make it very difficult to make data truly disappear. When we tell a computer to delete a file, it only deletes the reference to the data. The data itself remains on the disk unchanged. For any UNIX geek out there, you can easily see an example of that by greping a partition (e.g. &lt;code&gt;sudo grep password /dev/sda3&lt;/code&gt;. To solve this problem, there are “secure delete” options. Secure deletion removes the reference like regular deletion, then wipes the data on the disk by overwriting it with random data. That’s much better, but not always good enough. It turns out that its possible to remove the hard disk and read magnetic residue and recover even wiped data.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orweb Security Advisory: Possible IP leakage with HTML5 video/audio</title>
      <link>https://guardianproject.info/2013/08/21/orweb-security-advisory-possible-ip-leakage-with-html5-video/audio/</link>
      <pubDate>Wed, 21 Aug 2013 16:15:36 -0400</pubDate>
      <guid>https://guardianproject.info/2013/08/21/orweb-security-advisory-possible-ip-leakage-with-html5-video/audio/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://guardianproject.info/apps/orweb&#34;&gt;Orweb browser app&lt;/a&gt; is vulnerable to &lt;a href=&#34;https://dev.guardianproject.info/issues/1754&#34;&gt;leak the actual IP of the device&lt;/a&gt; it is on, if it loads a page with HTML5 video or audio tags on them, and those tags are set to auto-start or display a poster frame. On some versions of Android, the video and audio player start/load events happen without the user requesting anything, and the request to the URL for the media src or through image poster is made outside of the proxy settings.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot v12 now in beta</title>
      <link>https://guardianproject.info/2013/07/24/orbot-v12-now-in-beta/</link>
      <pubDate>Wed, 24 Jul 2013 12:32:45 -0400</pubDate>
      <guid>https://guardianproject.info/2013/07/24/orbot-v12-now-in-beta/</guid>
      <description>&lt;p&gt;After much too long, we’ve got a new build of Orbot out, and it is… a stable beta! Nothing radically new here, just many small changes to continue to improve the experience of our hundreds of thousands of active users out in the world. There will likely be one or two more “beta” releases to iron out small issues in v12, but for now, this one is good to go.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Jitsi, ostel.co and ISP censorship</title>
      <link>https://guardianproject.info/2013/07/22/jitsi-ostel.co-and-isp-censorship/</link>
      <pubDate>Mon, 22 Jul 2013 15:33:44 -0400</pubDate>
      <guid>https://guardianproject.info/2013/07/22/jitsi-ostel.co-and-isp-censorship/</guid>
      <description>&lt;p&gt;Earlier last week n8fr8 suspected something changed on the ostel.co server, due to many users emailing support specifically about Jitsi connectivity to ostel.co. The common question was “why did it work a few weeks ago and now it doesn’t anymore?”&lt;/p&gt;&#xA;&lt;p&gt;The tl;dr follows, skip to keyword CONCLUSION to hear only the punch line.&lt;/p&gt;&#xA;&lt;p&gt;To support n8fr8’s hypothesis, there was a small change to the server but I wan’t convinced it effected anything since all my clients continued to work properly, including Jitsi. Obviously &lt;em&gt;something&lt;/em&gt; had changed but none of us knew what it was. After some testing we discovered the problem was related to insecure connections from Jitsi to UDP port 5060 on ostel.co. Secure connections (on TCP port 5061) continued to work as expected.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our Newest App: PixelKnot</title>
      <link>https://guardianproject.info/2013/07/18/our-newest-app-pixelknot/</link>
      <pubDate>Thu, 18 Jul 2013 13:14:49 -0400</pubDate>
      <guid>https://guardianproject.info/2013/07/18/our-newest-app-pixelknot/</guid>
      <description>&lt;p&gt;Have you ever hidden in plain sight? Worn camouflage in the woods or an invisibility cloak in a narrow crooked alley? It’s really hard to do properly. We’re hoping that all changes with PixelKnot.&lt;/p&gt;&#xA;&lt;p&gt;PixelKnot is an app for hiding secret messages in pictures.  Sort of like invisible ink on the back of a painting, updated to the present.  The ancient art known as steganography, now updated for the 21st century and requiring a more rigorous set of safety standards.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Modernizing Expectations for the Nouveau Secure Mobile Messaging Movement</title>
      <link>https://guardianproject.info/2013/07/16/modernizing-expectations-for-the-nouveau-secure-mobile-messaging-movement/</link>
      <pubDate>Tue, 16 Jul 2013 00:52:31 -0400</pubDate>
      <guid>https://guardianproject.info/2013/07/16/modernizing-expectations-for-the-nouveau-secure-mobile-messaging-movement/</guid>
      <description>&lt;p&gt;&lt;em&gt;The tl;dr of this lengthy (tho entertaining and immensely important!) post is this: Stopping with “We support OTR” or “We support PGP” is not enough anymore. There are at &lt;strong&gt;least seven&lt;/strong&gt;, if not more, very important security features that any app claiming to provide secure messaging must implement as soon as possible, to truly safeguard a user’s communication content, metadata and identity.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;Note: The names “Gibberbot” and “ChatSecure” are used interchangeabley below, as we are in the midst of an app rebrand. Apologies!&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building, Securing, and Anonymizing Android Apps</title>
      <link>https://guardianproject.info/2013/07/05/building-securing-and-anonymizing-android-apps/</link>
      <pubDate>Fri, 05 Jul 2013 13:02:37 -0400</pubDate>
      <guid>https://guardianproject.info/2013/07/05/building-securing-and-anonymizing-android-apps/</guid>
      <description>&lt;div id=&#34;event-title&#34; data-name=&#34;Building, Securing, and Anonymizing Android Apps&#34;&gt;&#xA;  &lt;h1 itemprop=&#34;name&#34;&gt;&#xA;    Calling all Android devs:&#xA;  &lt;/h1&gt;&#xA;  &lt;p&gt;&#xA;    &lt;img class=&#34;aligncenter&#34; alt=&#34;&#34; src=&#34;break1.jpeg&#34; width=&#34;600&#34; height=&#34;450&#34; /&gt;&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;event-content&#34;&gt;&#xA;  &lt;ul&gt;&#xA;    &lt;ul&gt;&#xA;      &lt;li id=&#34;event-when&#34;&gt;&#xA;        &lt;div&gt;&#xA;          &lt;div id=&#34;event-when-display&#34;&gt;&#xA;            Tuesday, July 9, 2013 - 12:30 PM to &lt;time id=&#34;event-end-time&#34;&gt;1:30 PM &lt;/time&gt;&#xA;          &lt;/div&gt;&#xA;        &lt;/div&gt;&#xA;      &lt;/li&gt;&#xA;&lt;pre&gt;&lt;code&gt;  &amp;lt;li&amp;gt;&#xA;    &amp;lt;div&amp;gt;&#xA;      Live on the web: &amp;lt;a title=&amp;quot;Livestream Pivotal&amp;quot; href=&amp;quot;http://www.livestream.com/pivotallabs&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;livestream&amp;lt;/a&amp;gt;&#xA;    &amp;lt;/div&amp;gt;&#xA;  &amp;lt;/li&amp;gt;&#xA;  &#xA;  &amp;lt;li id=&amp;quot;event-where&amp;quot; data-id=&amp;quot;1561918&amp;quot; data-name=&amp;quot;Pivotal Labs&amp;quot; data-address=&amp;quot;841 Broadway, 8th Floor, New York, NY&amp;quot;&amp;gt;&#xA;    &amp;lt;div&amp;gt;&#xA;      &amp;lt;div id=&amp;quot;event-where-display&amp;quot; itemprop=&amp;quot;location&amp;quot; itemscope=&amp;quot;&amp;quot; itemtype=&amp;quot;http://schema.org/Place&amp;quot;&amp;gt;&#xA;        Live in person (with &amp;lt;a title=&amp;quot;Pivotal RSVP&amp;quot; href=&amp;quot;m&amp;amp;#x61;&amp;amp;#x69;l&amp;amp;#116;&amp;amp;#x6f;:&amp;amp;#105;&amp;amp;#x6e;&amp;amp;#x66;o&amp;amp;#x40;&amp;amp;#x67;u&amp;amp;#97;&amp;amp;#x72;d&amp;amp;#105;&amp;amp;#x61;&amp;amp;#x6e;p&amp;amp;#x72;&amp;amp;#x6f;j&amp;amp;#101;&amp;amp;#x63;t&amp;amp;#46;&amp;amp;#x69;&amp;amp;#x6e;f&amp;amp;#x6f;&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;RSVP&amp;lt;/a&amp;gt;) &amp;lt;a title=&amp;quot;&amp;quot; href=&amp;quot;http://maps.google.com/maps?q=841+Broadway%2C+8th+Floor%2C+New+York%2C+NY&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;Pivotal Labs &amp;lt;/a&amp;gt;841 Broadway, 8th Floor, New York, NY (&amp;lt;a href=&amp;quot;http://maps.google.com/maps?q=841+Broadway%2C+8th+Floor%2C+New+York%2C+NY&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;map&amp;lt;/a&amp;gt;)&#xA;      &amp;lt;/div&amp;gt;&#xA;    &amp;lt;/div&amp;gt;&#xA;  &amp;lt;/li&amp;gt;&#xA;&amp;lt;/ul&amp;gt;&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;  &lt;/ul&gt;&#xA;  &lt;div id=&#34;event-description-wrap&#34; itemprop=&#34;description&#34;&gt;&#xA;    &lt;p&gt;&#xA;      Please join us for lunch and crypto-talk with Hans-Christoph Steiner of the Guardian Project. Hans will talk about the how and why of building secure mobile applications that keep the user&#39;s data encrypted and hidden from prying eyes. We&#39;ll have a few short presentations on tools like SQLCipher, IOCipher, and NetCipher and how they can be used in modern applications. We&#39;ll answer questions about general strategies and specific toolkits that we&#39;ve created.&#xA;    &lt;/p&gt;</description>
    </item>
    <item>
      <title>A Weather Report On Security</title>
      <link>https://guardianproject.info/2013/06/14/a-weather-report-on-security/</link>
      <pubDate>Fri, 14 Jun 2013 13:22:28 -0400</pubDate>
      <guid>https://guardianproject.info/2013/06/14/a-weather-report-on-security/</guid>
      <description>&lt;p&gt;How’s the weather outside? Sunny with a chance of IP blocking.&lt;/p&gt;&#xA;&lt;p&gt;We recently launched a new initiative we’re calling: &lt;a href=&#34;https://guardianproject.info/code/weatherrepo/&#34; title=&#34;The Weather Repo&#34;&gt;The Weather Repo&lt;/a&gt;. The goal of the project is for organizations to have a more accurate method of understanding whether the apps they’re using are “safe”. It’s hard to know whether apps that claim to be secure really are. Have they been vetted by a third party? Are there existing case studies? Has a threat analysis been performed?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Carrier Grade, Verizon and the NSA</title>
      <link>https://guardianproject.info/2013/06/12/carrier-grade-verizon-and-the-nsa/</link>
      <pubDate>Wed, 12 Jun 2013 06:38:46 -0400</pubDate>
      <guid>https://guardianproject.info/2013/06/12/carrier-grade-verizon-and-the-nsa/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2013/06/PHONE_BOLT.png&#34;&gt;&lt;img class=&#34;size-medium wp-image-4188 alignleft&#34; alt=&#34;PHONE_BOLT&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2013/06/PHONE_BOLT-268x300.png&#34; width=&#34;268&#34; height=&#34;300&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2013/06/PHONE_BOLT-268x300.png 268w, https://guardianproject.info/wp-content/uploads/2013/06/PHONE_BOLT.png 514w&#34; sizes=&#34;(max-width: 268px) 100vw, 268px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Last week Glenn Greenwald at The Guardian broke the news that &lt;a href=&#34;http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order&#34;&gt;Verizon has been providing the NSA with metadata&lt;/a&gt; about all of the calls over a subsidiary’s network. This subsidiary is called &lt;a href=&#34;http://investing.businessweek.com/research/stocks/private/snapshot.asp?privcapId=4259068&#34;&gt;Verizon Business Network Services&lt;/a&gt;. It is a privately held company that “owns, operates, monitors, and maintains data and Internet networks in North America, Europe, Asia, Latin America, Australia, Japan, and Africa. The company provides converged communication solutions, such as local and long-distance voice, messaging, and Internet access services.” It is likely this company owns equipment that holds caller detail records for millions of customers. The order used &lt;a href=&#34;http://www.aclu.org/free-speech-national-security-technology-and-liberty/reform-patriot-act-section-215&#34;&gt;section 215 of The Patriot Act&lt;/a&gt;, which allows the FBI to order any person or entity to turn over “any tangible things,” so long as the FBI “specif[ies]” that the order is “for an authorized investigation . . . to protect against international terrorism or clandestine intelligence activities.” The “tangible things” could have been the physical servers or hard disks that store the logged details.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Only Way to Visit Strongbox on a Phone</title>
      <link>https://guardianproject.info/2013/05/16/the-only-way-to-visit-strongbox-on-a-phone/</link>
      <pubDate>Thu, 16 May 2013 17:43:06 -0400</pubDate>
      <guid>https://guardianproject.info/2013/05/16/the-only-way-to-visit-strongbox-on-a-phone/</guid>
      <description>&lt;p dir=&#34;ltr&#34;&gt;&#xA;  &lt;em&gt;The New Yorker&lt;/em&gt; magazine just launched &lt;a href=&#34;http://www.newyorker.com/online/blogs/closeread/2013/05/introducing-strongbox-anonymous-document-sharing-tool.html&#34;&gt;Strongbox&lt;/a&gt;, a whistleblower submission system that’s hosted on a hidden website. There’s only one way to access the hidden site on a phone or tablet, and that’s with our &lt;a href=&#34;https://play.google.com/store/apps/details?id=info.guardianproject.browser&amp;hl=en&#34;&gt;Orweb app&lt;/a&gt;. Here’s a simple breakdown of how to do securely and anonymously blow the whistle, explained in an interactive tutorial:&#xA;&lt;/p&gt;&#xA;&lt;p style=&#34;text-align: center;&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/howto/strongbox&#34; target=&#34;_blank&#34;&gt;&lt;img class=&#34;size-medium wp-image-3719  aligncenter&#34; alt=&#34;galaxy19&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2013/05/galaxy19-199x300.png&#34; width=&#34;199&#34; height=&#34;300&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2013/05/galaxy19-199x300.png 199w, https://guardianproject.info/wp-content/uploads/2013/05/galaxy19.png 400w&#34; sizes=&#34;(max-width: 199px) 100vw, 199px&#34; /&gt;&lt;/a&gt;&#xA;&lt;/p&gt;&#xA;&lt;p dir=&#34;ltr&#34; style=&#34;text-align: center;&#34;&gt;&#xA;  &lt;em&gt;Visit &lt;a title=&#34;strongbox tutorial&#34; href=&#34;https://guardianproject.info/howto/strongbox&#34; target=&#34;_blank&#34;&gt;guardianproject.info/howto/strongbox&lt;/a&gt; for an interactive tutorial on using Strongbox on your phone.&lt;/em&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>GnuPG for Android progress: we have an command line app!</title>
      <link>https://guardianproject.info/2013/05/09/gnupg-for-android-progress-we-have-an-command-line-app/</link>
      <pubDate>Thu, 09 May 2013 10:48:52 -0400</pubDate>
      <guid>https://guardianproject.info/2013/05/09/gnupg-for-android-progress-we-have-an-command-line-app/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2013/05/icon.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2013/05/icon-150x150.png&#34; alt=&#34;GnuPG for Android&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignleft size-thumbnail wp-image-3680&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2013/05/icon-150x150.png 150w, https://guardianproject.info/wp-content/uploads/2013/05/icon-300x300.png 300w, https://guardianproject.info/wp-content/uploads/2013/05/icon.png 512w&#34; sizes=&#34;(max-width: 150px) 100vw, 150px&#34; /&gt;&lt;/a&gt;&lt;br&gt;&#xA;This alpha release of our command-line developer tool brings GnuPG to Android for the first time!&lt;/p&gt;&#xA;&lt;p&gt;GNU Privacy Guard Command-Line (gpgcli) gives you command line access to the entire &lt;a href=&#34;http://gnupg.org&#34; title=&#34;Gnu Privacy Guard home page&#34; target=&#34;_blank&#34;&gt;GnuPG&lt;/a&gt; suite of encryption software. GPG is GNU’s tool for end-to-end secure communication and encrypted data storage. This trusted protocol is the free software alternative to PGP. GnuPG 2.1 is the new modularized version of GnuPG that now supports OpenPGP and S/MIME.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Awareness Party</title>
      <link>https://guardianproject.info/2013/04/26/security-awareness-party/</link>
      <pubDate>Fri, 26 Apr 2013 09:05:36 -0400</pubDate>
      <guid>https://guardianproject.info/2013/04/26/security-awareness-party/</guid>
      <description>&lt;p&gt;In the security world, there’s a pesky belief that a tool can either be secure or easy to use, but not both. Some experts also argue that training people to be safe online is too hard and doesn’t accomplish much (see Bruce Schneier’s recent post &lt;a href=&#34;http://www.schneier.com/blog/archives/2013/03/security_awaren_1.html&#34; target=&#34;_blank&#34;&gt;&lt;em&gt;Security Awareness Training&lt;/em&gt;&lt;/a&gt;). Without a thoughtful approach, that’s usually how it plays out. But it doesn’t have to be that way! We’re committed to making online security fun to learn and fun to use, and we’re launching a new series of interactive tutorials to make it happen. Consider this post an invitation to our festive Security Awareness Party. &lt;a href=&#34;https://guardianproject.info/home/how-you-can-work-with-us/&#34; target=&#34;_blank&#34;&gt;Beer is encouraged&lt;/a&gt;, especially if it comes from &lt;a title=&#34;Android-powered beer kegerator&#34; href=&#34;https://kegbot.org/&#34; target=&#34;_blank&#34;&gt;an Android-powered kegbot&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Gibberbot v11 is not just secure, its also simple, snappy and super fun!</title>
      <link>https://guardianproject.info/2013/03/08/gibberbot-v11-is-not-just-secure-its-also-simple-snappy-and-super-fun/</link>
      <pubDate>Fri, 08 Mar 2013 12:54:50 -0400</pubDate>
      <guid>https://guardianproject.info/2013/03/08/gibberbot-v11-is-not-just-secure-its-also-simple-snappy-and-super-fun/</guid>
      <description>&lt;p&gt;&lt;em&gt;Gibberbot v11 is now final as of RC3 release: &lt;a href=&#34;https://github.com/guardianproject/Gibberbot/tree/0.0.11-RC3&#34;&gt;https://github.com/guardianproject/Gibberbot/tree/0.0.11-RC3&lt;/a&gt;. From here, the only changes to v11 we will be making will be critical bug fixes. We are now focused on our v12 release, which you can track here: &lt;a href=&#34;https://dev.guardianproject.info/versions/39&#34;&gt;https://dev.guardianproject.info/versions/39&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Please promote our new Gibberbot how-to interactive tutorial available here: &lt;a href=&#34;https://guardianproject.info/howto/chatsecurely/&#34; target=&#34;_blank&#34;&gt;&lt;a href=&#34;https://guardianproject.info/howto/chatsecurely/&#34;&gt;https://guardianproject.info/howto/chatsecurely/&lt;/a&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;If you have been tracking our efforts here for the last few years, you will know that Gibberbot, our secure instant messaging app, started out as a big old mess of an app called “ORChat” as and then “OTRChat” and then “Gibber” (or “Jibber”?), and then finally settled down into the name and app it is known as now. Really it was a proof of concept, showing that you could indeed use the &lt;a href=&#34;https://github.com/gpolitis/otr4j&#34;&gt;OTR4J library&lt;/a&gt; built for desktops app, on Android.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lower Bounds of The Narrow Bands</title>
      <link>https://guardianproject.info/2013/02/22/lower-bounds-of-the-narrow-bands/</link>
      <pubDate>Fri, 22 Feb 2013 09:05:48 -0400</pubDate>
      <guid>https://guardianproject.info/2013/02/22/lower-bounds-of-the-narrow-bands/</guid>
      <description>&lt;p&gt;Voice is becoming a standard feature of any messaging app on mobile phones, in various forms using many different protocols. There’s the old guard, whom I will refer to as “Skype”. Some &lt;a href=&#34;https://www.privacyinternational.org/blog/skype-please-act-like-the-responsible-global-citizen-you-claim-to-be&#34;&gt;tough&lt;/a&gt; &lt;a href=&#34;http://www.skypeopenletter.com/&#34;&gt;questions&lt;/a&gt; have been thrown their way by many groups who support a free Internet. There’s Google Voice, which is not really VoIP. Apple is playing around in the hedge maze inside their walled garden with iChat. There’s also Facebook, who is rolling out &lt;a href=&#34;http://techcrunch.com/2013/01/16/facebook-rolls-out-voip-calling-to-u-s-ios-messenger-users/&#34;&gt;voice calling in Canada and the USA&lt;/a&gt; in their Messenger app on iOS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IOCipher beta: easy encrypted file storage for your Android app</title>
      <link>https://guardianproject.info/2013/02/07/iocipher-beta-easy-encrypted-file-storage-for-your-android-app/</link>
      <pubDate>Thu, 07 Feb 2013 14:45:28 -0400</pubDate>
      <guid>https://guardianproject.info/2013/02/07/iocipher-beta-easy-encrypted-file-storage-for-your-android-app/</guid>
      <description>&lt;p&gt;At long last, we are proud to announce the &lt;a href=&#34;https://guardianproject.info/code/iocipher/&#34;&gt;first beta release of IOCipher&lt;/a&gt;, an easy framework for providing virtual encrypted disks for Android apps.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;does not require root or any special permissions at all&lt;/li&gt;&#xA;&lt;li&gt;the API is a drop-in replacement for the standard java.io.File API, so if you have ever worked with files in Java, you already know how to use IOCipher&lt;/li&gt;&#xA;&lt;li&gt;works easiest in an app that stores all files in IOCipher, but using standard java.io with IOCipher is possible&lt;/li&gt;&#xA;&lt;li&gt;supports android-7 v2.1 and above&lt;/li&gt;&#xA;&lt;li&gt;licensed under the LGPL v3+&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;You can download it here:&lt;/p&gt;</description>
    </item>
    <item>
      <title>report on IOCipher beta dev sprint</title>
      <link>https://guardianproject.info/2013/01/31/report-on-iocipher-beta-dev-sprint/</link>
      <pubDate>Thu, 31 Jan 2013 19:45:44 -0400</pubDate>
      <guid>https://guardianproject.info/2013/01/31/report-on-iocipher-beta-dev-sprint/</guid>
      <description>&lt;p&gt;We are just wrapping up an intensive dev sprint on &lt;a href=&#34;https://guardianproject.info/code/iocipher/&#34;&gt;IOCipher&lt;/a&gt; in order to get the first real beta release out, and it has been a wonderfully productive session on many levels! Before we started this, we had a proof-of-concept project that was crashy and ridiculously slow. We’re talking crashes every 100 or so transactions and 9 minutes to write 2 megs. Abel and I were plodding thru the bugs, trying to find the motivation to dive into the hard problems in the guts of some of the more arcane parts of the code. Aaron Huttner of &lt;a href=&#34;http://gryphn.co/&#34; target=&#34;_blank&#34;&gt;Gryphn&lt;/a&gt; found IOCipher while developing their &lt;a href=&#34;https://play.google.com/store/apps/details?id=com.Gryphn.mms&amp;hl=en&#34; title=&#34;Gryphn Secure Text Messaging in the Google Play store&#34; target=&#34;_blank&#34;&gt;Gryphn Secure Text Messaging&lt;/a&gt; and thought it was a remarkable easy way to add encrypted storage of files, and it worked quickly for him, so he included it his app before we had even announced an alpha release (thanks again for the vote of confidence!).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mumble and the Bandwidth – Anonymous CB radio with Mumble and Tor</title>
      <link>https://guardianproject.info/2013/01/31/mumble-and-the-bandwidth-anonymous-cb-radio-with-mumble-and-tor/</link>
      <pubDate>Thu, 31 Jan 2013 02:05:50 -0400</pubDate>
      <guid>https://guardianproject.info/2013/01/31/mumble-and-the-bandwidth-anonymous-cb-radio-with-mumble-and-tor/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2013/01/mumble-and-the-bandwidth.jpg&#34;&gt;&lt;img class=&#34;aligncenter size-full wp-image-3186&#34; alt=&#34;mumble and the bandwidth&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2013/01/mumble-and-the-bandwidth.jpg&#34; width=&#34;800&#34; height=&#34;478&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2013/01/mumble-and-the-bandwidth.jpg 800w, https://guardianproject.info/wp-content/uploads/2013/01/mumble-and-the-bandwidth-300x179.jpg 300w&#34; sizes=&#34;(max-width: 800px) 100vw, 800px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The journey towards anonymous and secure voice communication is a long one. There’s lots of roadblocks to get your voice from point A to point B over the Internet if you need to prevent eavesdropping or censorship. There is the limited bandwidth of mobile data connections. There is the high latency of the TCP protocol. &lt;a href=&#34;https://www.torproject.org/about/overview.html.en#whyweneedtor&#34;&gt;To achieve anonymity via Tor&lt;/a&gt;, there’s even more latency added to each packet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>InformaCam wins Knight News Challenge</title>
      <link>https://guardianproject.info/2013/01/27/informacam-wins-knight-news-challenge/</link>
      <pubDate>Sun, 27 Jan 2013 08:11:56 -0400</pubDate>
      <guid>https://guardianproject.info/2013/01/27/informacam-wins-knight-news-challenge/</guid>
      <description>&lt;p&gt;WITNESS and The Guardian Project, the mobile security and app development experts, have just been awarded a Knight News Challenge grant from the John S. and James L. Knight Foundation for &lt;a href=&#34;http://salsa.democracyinaction.org/dia/track.jsp?v=2&amp;amp;c=ysa75Vej32Gfc9Nv2xH%2BrBgxT3asKcEO&#34;&gt;&lt;strong&gt;InformaCam&lt;/strong&gt;&lt;/a&gt; – the first app seeking to address issues of authentication for digital media. In total, the funding was for ~$320,000 USD, with about one third of the funding going directly to software development and testing. The rest of the funding will be applied to deployment, partnerships, awareness building, and all the other necessary things you must do to turn a “great idea” into something with real adoption and use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Voice over Tor?</title>
      <link>https://guardianproject.info/2012/12/10/voice-over-tor/</link>
      <pubDate>Mon, 10 Dec 2012 11:00:03 -0400</pubDate>
      <guid>https://guardianproject.info/2012/12/10/voice-over-tor/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/12/onioncart.jpg&#34;&gt;&lt;img class=&#34; wp-image-2968&#34; title=&#34;onioncart&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/12/onioncart.jpg&#34; alt=&#34;&#34; width=&#34;100%&#34; height=&#34;425&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/12/onioncart.jpg 700w, https://guardianproject.info/wp-content/uploads/2012/12/onioncart-300x182.jpg 300w&#34; sizes=&#34;(max-width: 700px) 100vw, 700px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Voice calls over &lt;a title=&#34;Tor Project&#34; href=&#34;https://www.torproject.org/&#34; target=&#34;_blank&#34;&gt;Tor&lt;/a&gt; are supposed to be impossible. It seems this may no longer be the case.&lt;/p&gt;&#xA;&lt;p&gt;Without being able to do voice over IP (VOIP) conversations over the Tor network, people are prevented from being able to route  calls outside of censored networks. People ask us if there is any way they can route voice traffic through Tor to avoid blocks. To our surprise, we tested &lt;a title=&#34;skype&#34; href=&#34;http://skype.com/&#34; target=&#34;_blank&#34;&gt;Skype&lt;/a&gt; and found that it can work acceptably over &lt;a title=&#34;Orbot&#34; href=&#34;https://guardianproject.info/apps/orbot/&#34; target=&#34;_blank&#34;&gt;Orbot&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Proposal for Secure Connection Notification on Android</title>
      <link>https://guardianproject.info/2012/11/15/proposal-for-secure-connection-notification-on-android/</link>
      <pubDate>Thu, 15 Nov 2012 10:07:49 -0400</pubDate>
      <guid>https://guardianproject.info/2012/11/15/proposal-for-secure-connection-notification-on-android/</guid>
      <description>&lt;p&gt;A major problem of mobile applications being increasingly used over web-based applications, is that there is no standard established for notifying the user of the state of security on the network connection. With a web browser, the evolution of the “lock” icon when an &lt;a href=&#34;https://en.wikipedia.org/wiki/HTTP_Secure&#34;&gt;HTTPS connection&lt;/a&gt; is made, has been one that evolved originally out of Netscape’s first implementation, to an adhoc, defact industry-standard way of letting the user know if their connection is secure. Beyond just a binary on/off, the lock icon is also the entry point into viewing more information about the digital security tokens, keys and certificates that are powering the connection – who authorized them, who requested them, and so on. More recently, with browsers such as Chrome, there has been the user of color schemes (Green is good, Red is bad), verified domain display and other indicators to help ensure the user knows when to trust their connection, and when to be wary.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot v11 is out!</title>
      <link>https://guardianproject.info/2012/10/26/orbot-v11-is-out/</link>
      <pubDate>Fri, 26 Oct 2012 06:37:23 -0400</pubDate>
      <guid>https://guardianproject.info/2012/10/26/orbot-v11-is-out/</guid>
      <description>&lt;p&gt;After previous fits and starts, we’ve stabilized Orbot v11 now with the RC6 release. Our core testers and public users via the Google Play distribution are back to happy and stable states of being.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/10/orbotv11.png&#34;&gt;&lt;img class=&#34;alignleft  wp-image-2910&#34; style=&#34;margin-left: 3px; margin-right: 3px;&#34; title=&#34;orbotv11&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/10/orbotv11-168x300.png&#34; alt=&#34;&#34; width=&#34;131&#34; height=&#34;234&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/10/orbotv11-168x300.png 168w, https://guardianproject.info/wp-content/uploads/2012/10/orbotv11-576x1024.png 576w, https://guardianproject.info/wp-content/uploads/2012/10/orbotv11.png 720w&#34; sizes=&#34;(max-width: 131px) 100vw, 131px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The latest version can be found:&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;In Google Play:&lt;br&gt;&#xA;&lt;a href=&#34;https://play.google.com/store/apps/details?id=org.torproject.android&#34;&gt;https://play.google.com/store/apps/details?id=org.torproject.android&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;In our F-Droid repo:&lt;br&gt;&#xA;&lt;a href=&#34;https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository/&#34;&gt;https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Our via direct APK here:&lt;br&gt;&#xA;&lt;a href=&#34;https://guardianproject.info/releases/Orbot-release-0.2.3.23-rc-1.0.11-RC6.apk&#34;&gt;https://guardianproject.info/releases/Orbot-release-0.2.3.23-rc-1.0.11-RC6.apk&lt;/a&gt;&lt;br&gt;&#xA;(.asc)&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;As always you can file bugs on &lt;a href=&#34;https://trac.torproject.org&#34;&gt;trac.torproject.org&lt;/a&gt; or the guardian&lt;br&gt;&#xA;tracker: &lt;a href=&#34;https://dev.guardianproject.info/projects/orbot/issues/new&#34;&gt;https://dev.guardianproject.info/projects/orbot/issues/new&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ToFU/PoP in your Android App!  (a.k.a. extending Orlib to communicate over Tor)</title>
      <link>https://guardianproject.info/2012/09/20/tofu/pop-in-your-android-app-a.k.a.-extending-orlib-to-communicate-over-tor/</link>
      <pubDate>Thu, 20 Sep 2012 15:17:36 -0400</pubDate>
      <guid>https://guardianproject.info/2012/09/20/tofu/pop-in-your-android-app-a.k.a.-extending-orlib-to-communicate-over-tor/</guid>
      <description>&lt;p&gt;In doing my research for InformaCam, I learned a couple of neat tricks for getting an app to communicate over Tor. Here’s a how-to for app developers to use depending on your threat model, and how you have your web server set-up. Enjoy, and please post your comments/questions/suggestions below…&lt;/p&gt;&#xA;&lt;h2 id=&#34;before-we-begin&#34;&gt;Before we begin…&lt;/h2&gt;&#xA;&lt;p&gt;You’re going to need some basic stuff up-and-running for this to work. Before you get coding, make sure you have the following:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sometimes the best solution is a library, not an app</title>
      <link>https://guardianproject.info/2012/08/27/sometimes-the-best-solution-is-a-library-not-an-app/</link>
      <pubDate>Mon, 27 Aug 2012 12:30:15 -0400</pubDate>
      <guid>https://guardianproject.info/2012/08/27/sometimes-the-best-solution-is-a-library-not-an-app/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/08/framework_wheel.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/08/framework_wheel-150x150.png&#34; alt=&#34;&#34; title=&#34;thinking about frameworks&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignleft size-thumbnail wp-image-2792&#34; /&gt;&lt;/a&gt;Our general approach to software development starts with surveying existing solutions that are available and in use, to see if there is already enough of an ecosystem or whether we need to seed that. When there is already an adundance of tools and apps out there, we work to find the good ones, provide feedback and auditing, and then build apps and tools to fill in any gaps. For example, this was our approach in the Open Secure Telephony Network.&lt;/p&gt;</description>
    </item>
    <item>
      <title>From #HOPE9: Your Cell Phone Is Covered in Spiders! – Practical Android Security</title>
      <link>https://guardianproject.info/2012/07/19/from-%23hope9-your-cell-phone-is-covered-in-spiders-practical-android-security/</link>
      <pubDate>Thu, 19 Jul 2012 14:53:21 -0400</pubDate>
      <guid>https://guardianproject.info/2012/07/19/from-%23hope9-your-cell-phone-is-covered-in-spiders-practical-android-security/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/cooperq&#34;&gt;Cooperq&lt;/a&gt; gave a great talk on Android security late Saturday night at the recent &lt;a href=&#34;http://www.hopenumbernine.net/&#34;&gt;Hackers on Planet Earth Number 9 aka Hope9&lt;/a&gt; gathering. You can find the &lt;a href=&#34;https://github.com/cooperq/spiders&#34;&gt;slides/src on Github&lt;/a&gt; and &lt;a href=&#34;http://vimeo.com/46044290&#34;&gt;video up on Vimeo&lt;/a&gt;. Cooper wrote some notes, as well:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;This talk was given at hope 9. Please feel free to give it yourself, repourpose it, add to it or do whatever you want. I release this talk to the public domain. I have included here some additional resources that are worth checking out.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Threats and Usability of Secure Voice</title>
      <link>https://guardianproject.info/2012/07/10/threats-and-usability-of-secure-voice/</link>
      <pubDate>Tue, 10 Jul 2012 12:48:18 -0400</pubDate>
      <guid>https://guardianproject.info/2012/07/10/threats-and-usability-of-secure-voice/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://guardianproject.info/2012/07/05/a-network-analysis-of-encrypted-voice-over-ostn/&#34;&gt;previous post&lt;/a&gt; I found that end-to-end encryption with OSTN is both effective and usable. There are two important things the user must be aware of when using OSTN. They must confirm with each phone call that the encryption icon is present and  they must correctly complete SAS verification dialog boxes. So on a basic level, encrypted voice just works. But, what does this all mean? This post looks at the threats to security and usability of encrypted ZRTP phone calls in CSipSimple.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Network Analysis of Encrypted Voice over OSTN</title>
      <link>https://guardianproject.info/2012/07/05/a-network-analysis-of-encrypted-voice-over-ostn/</link>
      <pubDate>Thu, 05 Jul 2012 14:23:50 -0400</pubDate>
      <guid>https://guardianproject.info/2012/07/05/a-network-analysis-of-encrypted-voice-over-ostn/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction to OSTN&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://guardianproject.info/wiki/OSTN&#34;&gt;OSTN&lt;/a&gt; network stands for Open Source Telephony Network. It is a federated network standard for supporting Internet calling with end-to-end encryption ala ZRTP. Its very similar to e-mail in that VOIP calls can be routed to addresses such as user@domain.tld. Its a simple concept, but I believe it to be ground breaking implementation! Never before have I seen such an accessible solution to encrypted VOIP calls. OSTN is platform independent, is a federated network, and it is an open standard such that it is widely adoptable. There are two main components that are required to use OSTN with encryption: a VOIP client that supports ZRTP for end-to-end encryption and user account with an OSTN provider.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our Research</title>
      <link>https://guardianproject.info/2012/07/03/our-research/</link>
      <pubDate>Tue, 03 Jul 2012 11:48:40 -0400</pubDate>
      <guid>https://guardianproject.info/2012/07/03/our-research/</guid>
      <description>&lt;p&gt;You can track our latest work on our public research wiki located at &lt;a href=&#34;https://guardianproject.info/wiki&#34;&gt;https://guardianproject.info/wiki&lt;/a&gt; or through the links below.&lt;/p&gt;&#xA;&lt;h2 id=&#34;events&#34;&gt;EVENTS&lt;/h2&gt;&#xA;&lt;p&gt;Head to the &lt;a href=&#34;https://guardianproject.info/wiki/Events&#34; rel=&#34;nofollow&#34;&gt;Events&lt;/a&gt; page for a full list of past and future events that we&amp;rsquo;ll be attending or featured at.&lt;/p&gt;&#xA;&lt;h2 id=&#34;research--development&#34;&gt;RESEARCH &amp;amp; DEVELOPMENT&lt;/h2&gt;&#xA;&lt;p&gt;In addition to our open software development projects, we&amp;rsquo;re actively engaged in a number of research projects focused on critical unsolved mobile security problems. Solving these problems with freely available, open source software has the potential to greatly benefit activists, human rights defenders and journalists worldwide.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Freebird Flys High</title>
      <link>https://guardianproject.info/2012/06/28/freebird-flys-high/</link>
      <pubDate>Thu, 28 Jun 2012 11:59:38 -0400</pubDate>
      <guid>https://guardianproject.info/2012/06/28/freebird-flys-high/</guid>
      <description>&lt;div style=&#34;width: 620px&#34; class=&#34;wp-caption aligncenter&#34;&gt;&#xA;  &lt;a href=&#34;https://guardianproject.info/events/freebird2012rio/index.php?cmd=image&amp;sfpg=KmZyZWViaXJkZ3JvdXAuanBnKjk3NjQzMjVmMmJlZDAzMjliZDQ3MzhiY2Q0MzQyNjdi&#34;&gt;&lt;img src=&#34;https://guardianproject.info/events/freebird2012rio/index.php?cmd=image&amp;sfpg=KmZyZWViaXJkZ3JvdXAuanBnKjk3NjQzMjVmMmJlZDAzMjliZDQ3MzhiY2Q0MzQyNjdi&#34; alt=&#34;&#34; width=&#34;610&#34; height=&#34;458&#34; /&gt;&lt;/a&gt;&#xA;  &lt;p class=&#34;wp-caption-text&#34;&gt;&#xA;    Freebird: Rio group picture via Obscuracam for Android&#xA;  &lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;p style=&#34;text-align: center;&#34;&gt;&#xA;  &lt;p style=&#34;text-align: left;&#34;&gt;&#xA;    What happens when you gather coders with privacy and security activists from around the world? &lt;a title=&#34;freebird&#34; href=&#34;https://guardianproject.info/freebird/&#34; target=&#34;_blank&#34;&gt;Freebird&lt;/a&gt;!&#xA;  &lt;/p&gt;&#xA;  &lt;p style=&#34;text-align: left;&#34;&gt;&#xA;    We held a simultaneous event in NYC and Rio, a one-day &lt;a title=&#34;barcamp&#34; href=&#34;http://barcamp.org/&#34; target=&#34;_blank&#34;&gt;barcamp&lt;/a&gt; aimed to empower users to be more informed and engaged around their use of mobile technology, while engaging with developers to promote interest in open-source tools, security and privacy. Freebird was a pre-event for &lt;a title=&#34;rightscon&#34; href=&#34;https://www.rightscon.org/&#34; target=&#34;_blank&#34;&gt;RightsCon:Rio&lt;/a&gt;, which allowed us to continue and extend conversations and ideas into the larger context of information technologies and human rights. &lt;strong&gt; &lt;/strong&gt;&#xA;  &lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot Data Tax (Updated!)</title>
      <link>https://guardianproject.info/2012/06/20/orbot-data-tax-updated/</link>
      <pubDate>Wed, 20 Jun 2012 13:05:53 -0400</pubDate>
      <guid>https://guardianproject.info/2012/06/20/orbot-data-tax-updated/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Update (6/26/12): I Found Orbot to have lower idle usage then previously recorded. The post now reflects the new statistics. The previous stats were based on idle usage at 92 bytes/s&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;There have been many inquiries about the cost of Orbot’s data usage. I ran five different tests to record the types of data tax a user might encounter. Heavy usage of Orbot combined with a low monthly data allotment could be an issue.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Auditing Twitter With Orbot</title>
      <link>https://guardianproject.info/2012/06/13/auditing-twitter-with-orbot/</link>
      <pubDate>Wed, 13 Jun 2012 20:31:57 -0400</pubDate>
      <guid>https://guardianproject.info/2012/06/13/auditing-twitter-with-orbot/</guid>
      <description>&lt;p&gt;Twitter’s new Android application provides a proxy option that supports Orbot. It is a great way to access Twitter, particularly if Twitter is blocked. Check out the &lt;a href=&#34;https://guardianproject.info/2012/05/02/orbot-your-twitter/&#34;&gt;Orbot Your Twitter&lt;/a&gt; blog post! That post explains how to set up Orbot with Twitter, however, it came with an important disclaimer:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;WARNING AND DISCLAIMER: Twitter for Android is proprietary, closed-source software. Details of the implementation of proxy support have not been publicly disclosed or audited by a third-party at this time. In particular, resolution of hostnames via DNS may not be properly routed through Tor (this is a common issue with proxied software). In addition, through other permissions that Twitter for Android may have you on your device, there may be a strong ability to correlate identity between your registered Google Account and your activities on Twitter.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>&lt;!--:en--&gt;A Partnership for Open Secure Mobile Messaging between iOS and Android&lt;!--:--&gt;</title>
      <link>https://guardianproject.info/2012/06/08/--en--a-partnership-for-open-secure-mobile-messaging-between-ios-and-android----/</link>
      <pubDate>Fri, 08 Jun 2012 12:05:34 -0400</pubDate>
      <guid>https://guardianproject.info/2012/06/08/--en--a-partnership-for-open-secure-mobile-messaging-between-ios-and-android----/</guid>
      <description>&lt;!--:en--&gt;&#xA;&lt;p&gt;**We believe in protocols, not products. We believe in partnerships, not proprietary fiefdoms. We believe in building a community of collaborators, not a cacophony of criticism and unnecessary competition. We believe in practical solutions to perilous problems. **&lt;/p&gt;&#xA;&lt;p&gt;With all of this in mind, we are very happy to announce our partnership and support of the &lt;a href=&#34;https://chatsecure.org&#34;&gt;ChatSecure for iOS&lt;/a&gt; open-source free software project. Through our our two year history, we have been lucky to receive support from a variety of donors and funders, and we are now using what influence and opportunities we have to endorse other projects that we feel are compatible with our outlook and goals.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&lt;!--:en--&gt;OSTN secure VoIP wizard now built into CSipSimple for Android&lt;!--:--&gt;</title>
      <link>https://guardianproject.info/2012/05/26/--en--ostn-secure-voip-wizard-now-built-into-csipsimple-for-android----/</link>
      <pubDate>Sat, 26 May 2012 21:14:52 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/26/--en--ostn-secure-voip-wizard-now-built-into-csipsimple-for-android----/</guid>
      <description>&lt;!--:en--&gt;If you saw our last post about how to &#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/2012/05/17/build-your-own-open-secure-telephony-network-some-assembly-required/&#34;&gt;setup your own secure voice-over-IP server instance&lt;/a&gt;, then this news is for you.&lt;/p&gt;&#xA;&lt;p&gt;If you are an Android user looking for the &lt;a href=&#34;https://code.google.com/p/csipsimple/&#34;&gt;best open-source VoIP app&lt;/a&gt;, and really need one that can support &lt;a href=&#34;https://OSTel.co&#34;&gt;secure communications&lt;/a&gt;, then this post is ALSO for you.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://code.google.com/p/csipsimple/&#34;&gt;CSipSimple&lt;/a&gt;, the previously mentioned “best VoIP app”, now includes a wizard for setting up an account configuration for any server which complies with our &lt;a href=&#34;https://guardianproject.info/wiki/OSTN_Compliance_Specification&#34;&gt;Open Secure Telephony Network specification&lt;/a&gt;. In short, this means it uses TLS or SSL to secure the SIP signaling traffic, and supports proxying of the RTP media streams for the actual voice or video calls, without in any way interfering with the ZRTP encryption passing through it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&lt;!--:en--&gt;Build your own Open Secure Telephony Network, some assembly required&lt;!--:--&gt;</title>
      <link>https://guardianproject.info/2012/05/17/--en--build-your-own-open-secure-telephony-network-some-assembly-required----/</link>
      <pubDate>Thu, 17 May 2012 17:13:39 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/17/--en--build-your-own-open-secure-telephony-network-some-assembly-required----/</guid>
      <description>&lt;!--:en--&gt;The Open Secure Telephony Network is a standard that defines how to configure a VoIP softswitch with the capability to have secure two-way VoIP conversations if both parties are using the same server. The system requires both backend and frontend components, which makes OSTN is a little different than some of the other Guardian apps. Unlike Gibberbot, there are few public SIP services that support secure signalling for a mobile app to connect with. Notably &#xA;&lt;p&gt;&lt;a href=&#34;https://tanstagi.net&#34;&gt;Tanstagi.net&lt;/a&gt; offers free accounts. But it’s more fun to run your own.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IOCipher lives! encrypted virtual file system for Android</title>
      <link>https://guardianproject.info/2012/05/17/iocipher-lives-encrypted-virtual-file-system-for-android/</link>
      <pubDate>Thu, 17 May 2012 16:44:35 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/17/iocipher-lives-encrypted-virtual-file-system-for-android/</guid>
      <description>&lt;p&gt;Nathan and I just got the first complete test of IOCipher working in the IOCipherServer/SpotSync app. We created a filesystem sqlite.db file, then mounted it and got all the files via HTTP. In the test suite, I have lots of operations all running fine and encrypting! The core idea here is a java.io API replacement that transparently writes to an encrypted store. So for the most part, just change your import statements from:&lt;/p&gt;</description>
    </item>
    <item>
      <title>&lt;!--:en--&gt;Bye, bye, BBM! Facebook Allows Verifiable Encrypted Mobile Messaging for Android and iOS; Mobile Revenue Threatened?&lt;!--:--&gt;</title>
      <link>https://guardianproject.info/2012/05/16/--en--bye-bye-bbm-facebook-allows-verifiable-encrypted-mobile-messaging-for-android-and-ios-mobile-revenue-threatened----/</link>
      <pubDate>Wed, 16 May 2012 17:28:03 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/16/--en--bye-bye-bbm-facebook-allows-verifiable-encrypted-mobile-messaging-for-android-and-ios-mobile-revenue-threatened----/</guid>
      <description>&lt;!--:en--&gt;Yes, yes, we are trying to get in on all of the Facebook pre-IPO buzz. Fortunately, the headline is true – through &#xA;&lt;p&gt;&lt;a href=&#34;https://developers.facebook.com/docs/chat/&#34;&gt;Facebook’s support for open-standards messaging&lt;/a&gt;, our secure mobile messaging app, &lt;a href=&#34;https://guardianproject.info/apps/gibber&#34;&gt;Gibberbot for Android&lt;/a&gt;, can be used to communicate securely with any other friend on Facebook who is ALSO using a secure messaging app. Whether it is &lt;a href=&#34;https://guardianproject.info/apps/gibber&#34;&gt;Gibberbot&lt;/a&gt;, &lt;a href=&#34;http://chrisballinger.info/apps/chatsecure/&#34;&gt;ChatSecure for iOS&lt;/a&gt;, Adium (Mac), Pidgin (Windows/Linux), or one of the many secure messaging apps that support the &lt;a href=&#34;http://www.cypherpunks.ca/otr/&#34;&gt;Off-the-Record encryption capability&lt;/a&gt;, Facebook allows encrypted messaging between mobile and desktops alike.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cross-Domain calling, or “toll-free long distance VoIP”</title>
      <link>https://guardianproject.info/2012/05/04/cross-domain-calling-or-toll-free-long-distance-voip/</link>
      <pubDate>Fri, 04 May 2012 17:34:30 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/04/cross-domain-calling-or-toll-free-long-distance-voip/</guid>
      <description>&lt;p&gt;In a standard &lt;a href=&#34;https://guardianproject.info/wiki/OSTN_Compliance_Specification&#34;&gt;OSTN configuration&lt;/a&gt;, the Fully Qualified Domain Name (&lt;a href=&#34;https://en.wikipedia.org/wiki/FQDN&#34;&gt;FQDN&lt;/a&gt;) of the server running Freeswitch is a core dependency to operate the service. For example, the domain ostel.me was first configured as a DNS record, a server was bootstrapped with ostel.me as the local hostname and a &lt;a href=&#34;https://github.com/lazzarello/chef-twelvetone&#34;&gt;Freeswitch cookbook&lt;/a&gt; was run using the Chef automation system. Because the domain was configured both in DNS and locally, the cookbook has enough information to automatically build an operational OSTN node.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot Your Twitter!</title>
      <link>https://guardianproject.info/2012/05/02/orbot-your-twitter/</link>
      <pubDate>Wed, 02 May 2012 17:19:27 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/02/orbot-your-twitter/</guid>
      <description>&lt;p&gt;In some ways, Twitter is the perfect application to run over the &lt;a href=&#34;https://torproject.org&#34;&gt;Tor network&lt;/a&gt;. It works with small bits of data, it is asynchronous, works naturally in a “store and forward” queue model, and in general, has a decent amount of &lt;a href=&#34;https://twitter.com/about/security&#34;&gt;default security built-in&lt;/a&gt; through HTTP/S support and OAuth. Compared to the problem-child of the open web, which often involves large websites, streaming video, flash embeds, and malicious javascript, Twitter is a nearly perfect candidate for use over a secure, anonymous (but sometimes high latency) network. Add to the fact that Twitter is often &lt;a href=&#34;https://en.wikipedia.org/wiki/List_of_websites_blocked_in_the_People&#39;s_Republic_of_China&#34;&gt;blocked or monitored in many countries&lt;/a&gt;who do not care for free speech and human rights, and it becomes almost a necessity that you use it with a service like Tor.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mobile mesh in a real world test</title>
      <link>https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/</link>
      <pubDate>Wed, 02 May 2012 15:37:37 -0400</pubDate>
      <guid>https://guardianproject.info/2012/05/02/mobile-mesh-in-a-real-world-test/</guid>
      <description>&lt;p&gt;Nathan, Mark, Lee, and I tried some OLSR mesh testing during the May Day protests and marches. We were able to get 4 devices to associate and mesh together, but not without some trials and travails. Two pairs of devices setup two separate BSSIDs, so were on separate networks. We turned them all off, then associated them one at a time, and then they all got onto the same BSSID and olsrd started doing its thing. This made us think that we should just use a hard-coded BSSID in the setup, with a preference to allow standard ad-hoc association to find a BSSID. &lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/05/526191_338865336181237_184749301592842_866151_1316470506_n.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/05/526191_338865336181237_184749301592842_866151_1316470506_n-300x225.jpg&#34; alt=&#34;&#34; width=&#34;300&#34; height=&#34;225&#34; class=&#34;alignright size-medium wp-image-2037&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/05/526191_338865336181237_184749301592842_866151_1316470506_n-300x225.jpg 300w, https://guardianproject.info/wp-content/uploads/2012/05/526191_338865336181237_184749301592842_866151_1316470506_n.jpg 600w&#34; sizes=&#34;(max-width: 300px) 100vw, 300px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Singing and Dancing for Encryption</title>
      <link>https://guardianproject.info/2012/04/19/singing-and-dancing-for-encryption/</link>
      <pubDate>Thu, 19 Apr 2012 09:30:48 -0400</pubDate>
      <guid>https://guardianproject.info/2012/04/19/singing-and-dancing-for-encryption/</guid>
      <description>&lt;p style=&#34;text-align: center&#34;&gt;&#xA;  &lt;span style=&#34;color: #000000&#34;&gt;&lt;span style=&#34;font-family: ArialMT,sans-serif&#34;&gt;&lt;span style=&#34;font-size: small&#34;&gt;&lt;a href=&#34;https://secure.flickr.com/photos/ksd-photography/4899157618/&#34;&gt;&lt;img class=&#34;aligncenter&#34; src=&#34;https://farm5.staticflickr.com/4099/4899157618_b35f53be23_z.jpg&#34; alt=&#34;【KSD Photography】 Capturing Life&#34; width=&#34;640&#34; height=&#34;343&#34; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&#xA;&lt;/p&gt;&#xA;&lt;p style=&#34;text-align: left&#34;&gt;&#xA;  &lt;span style=&#34;color: #000000&#34;&gt;&lt;span style=&#34;font-family: ArialMT,sans-serif&#34;&gt;&lt;span style=&#34;font-size: small&#34;&gt;If you see me dancing or singing with my phone in my hand, I may not just be having a great time, but also creating an encryption key. Part of the issue with security is that it can often be difficult to implement or an added step in what users want to be an easy and seamless process. What if we can make secure and private communications fun and easy?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>User scenarios to guide our crypto development</title>
      <link>https://guardianproject.info/2012/04/14/user-scenarios-to-guide-our-crypto-development/</link>
      <pubDate>Sat, 14 Apr 2012 20:16:03 -0400</pubDate>
      <guid>https://guardianproject.info/2012/04/14/user-scenarios-to-guide-our-crypto-development/</guid>
      <description>&lt;p&gt;At Guardian Project, we find user-centered development to be essential to producing useful software that addresses real world needs. To drive this, we work with user stories and scenarios as part of the process of developing software. One particular development focus is the &lt;a href=&#34;https://guardianproject.info/wiki/PSST&#34; title=&#34;Portable Shared Security Token&#34; target=&#34;_blank&#34;&gt;Portable Shared Security Token (PSST)&lt;/a&gt; project, which aims to make it easy to use encryption across both mobile and desktop computers, as well as keep the stores of cryptographic identities (i.e. trusted keys, certificates, etc) in sync between devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How We Help</title>
      <link>https://guardianproject.info/2012/04/10/how-we-help/</link>
      <pubDate>Tue, 10 Apr 2012 00:00:00 +0000</pubDate>
      <guid>https://guardianproject.info/2012/04/10/how-we-help/</guid>
      <description>&lt;p&gt;While we think that a secure, privacy-enhanced mobile phone is a good thing for just about anybody going about their daily lives, we like to also consider the extreme cases, where this technology might change the course of someones life.&lt;/p&gt;&#xA;&lt;p&gt;The Economist covered our work with WITNESS on &lt;a href=&#34;https://www.witness.org/cameras-everywhere/witness-labs&#34;&gt;Secure Smart Cameras&lt;/a&gt;, and the &lt;a href=&#34;https://www.youtube.com/watch?v=lk2dTeDSHB8&amp;amp;feature=player_embedded&#34;&gt;&amp;ldquo;Future of Protest Video&amp;rdquo;&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Below are a few ideas of how Guardian phones might be used in the real world.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Transparent encrypted virtual disks for Android (we call it IOCipher)</title>
      <link>https://guardianproject.info/2012/04/03/transparent-encrypted-virtual-disks-for-android-we-call-it-iocipher/</link>
      <pubDate>Tue, 03 Apr 2012 13:16:41 -0400</pubDate>
      <guid>https://guardianproject.info/2012/04/03/transparent-encrypted-virtual-disks-for-android-we-call-it-iocipher/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/04/blog_sed.png&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/04/blog_sed.png&#34; alt=&#34;&#34; width=&#34;200&#34; height=&#34;200&#34; class=&#34;alignleft size-full wp-image-1764&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/04/blog_sed.png 200w, https://guardianproject.info/wp-content/uploads/2012/04/blog_sed-150x150.png 150w&#34; sizes=&#34;(max-width: 200px) 100vw, 200px&#34; /&gt;&lt;/a&gt;When using phones, laptops, computers, etc. it feels like a private experience, as if our screen was the same as a piece of paper, and when that paper is gone, then no one can see it anymore. Digital media works very differently. While the user interface portrays the deletion of files as very final, for someone with the right tools, it is actually not hard to recover deleted files. Also, digital information takes up so little space, we now regularly carry vast amounts of information in our pockets. Our phones have become amazingly powerful computers, storing as many photos, videos, documents, etc. in our pockets as would have required a room not so long ago. So when you lose this phone, or it gets stolen, or accessed against your wishes, the lies of the interface are laid bare, and vast troves of your information is now in someone else’s hands. So how can we capitalize on all this power without giving up control of our information?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Knight News funding of SecureSmartCam = a #WIN for open-source mobile security</title>
      <link>https://guardianproject.info/2012/03/29/knight-news-funding-of-securesmartcam-a-%23win-for-open-source-mobile-security/</link>
      <pubDate>Thu, 29 Mar 2012 12:07:47 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/29/knight-news-funding-of-securesmartcam-a-%23win-for-open-source-mobile-security/</guid>
      <description>&lt;p&gt;Along with our partner &lt;a href=&#34;https://www.witness.org&#34;&gt;WITNESS&lt;/a&gt;, we’ve entered our &lt;a href=&#34;http://newschallenge.tumblr.com/post/19436756887/securesmartcam-protecting-the-privacy-and-data-of&#34;&gt;SecureSmartCam project&lt;/a&gt; into the &lt;a href=&#34;http://newschallenge.tumblr.com/&#34;&gt;Knight News Challenge&lt;/a&gt;, and we need your support to get to the next round.&lt;/p&gt;&#xA;&lt;p&gt;Here’s a bit more about the challenge:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The Knight News Challenge, an international media innovation contest, is evolving – and will be offered three times, with three different topics. The first challenge will be centered on networks, and will accept applications Feb. 27 – March 17. The Networks challenge round seeks projects that use the best of existing software and platforms – those already integrated into people’s lives – to find new ways to convey news and information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Call My Email</title>
      <link>https://guardianproject.info/2012/03/22/call-my-email/</link>
      <pubDate>Thu, 22 Mar 2012 16:31:45 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/22/call-my-email/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://commons.wikimedia.org/wiki/File:PFC_Gladys_Bellon,_Basile,_Louisiana,_one_of_the_27_WAC_switchboard_operators_flown_from_Paris_for_the_Potsdam..._-_NARA_-_199010.jpg&#34;&gt;&lt;img class=&#34;aligncenter&#34; src=&#34;https://upload.wikimedia.org/wikipedia/commons/thumb/b/bc/PFC_Gladys_Bellon%2C_Basile%2C_Louisiana%2C_one_of_the_27_WAC_switchboard_operators_flown_from_Paris_for_the_Potsdam..._-_NARA_-_199010.jpg/764px-PFC_Gladys_Bellon%2C_Basile%2C_Louisiana%2C_one_of_the_27_WAC_switchboard_operators_flown_from_Paris_for_the_Potsdam..._-_NARA_-_199010.jpg&#34; alt=&#34;PFC Gladys Bellon, Basile, Louisiana, one of the 27 WAC switchboard operators flown from Paris for the Potsdam Conference and Sgt. Robert Scott of Pittsburgh, Pennsylvania, test lines in the frame room of the Victory switchboard at U. S. headquarters at Babelsburg, Germany.&#34; width=&#34;600/&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;What if you could call me directly through my email? No exchanging of phone numbers or searching for handles on Skype. Just plain and simple email. Now what if we can make that phone call as secure as it is easy. That’s the goal of what we’re doing here at &lt;a title=&#34;Open Secure Telephony Network (OSTN) &#34; href=&#34;https://guardianproject.info/wiki/OSTN&#34; target=&#34;_blank&#34;&gt;Open Secure Telephony Network (OSTN)&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Acrobits Groundwire – OSTN supports iPhone</title>
      <link>https://guardianproject.info/2012/03/21/acrobits-groundwire-ostn-supports-iphone/</link>
      <pubDate>Wed, 21 Mar 2012 09:09:21 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/21/acrobits-groundwire-ostn-supports-iphone/</guid>
      <description>&lt;p&gt;The Guardian Project develops open source software primarily for the Android platform &lt;a href=&#34;https://guardianproject.info/home/use-cases/&#34;&gt;but we strive for security by design to be a part of all platforms&lt;/a&gt;. With &lt;a href=&#34;https://guardianproject.info/wiki/OSTN&#34;&gt;OSTN&lt;/a&gt;, there are two major components. The the first is the server, which operates as the primary user directory and call switch. The other is the client, which is the program you interact with to send and receive calls.&lt;/p&gt;&#xA;&lt;p&gt;While the Apple App Store &lt;a href=&#34;http://michelf.com/weblog/2011/gpl-ios-app-store/&#34;&gt;forbids distribution of GPL licensed software from their service&lt;/a&gt;, the underlying protocols used by OSTN are open, so even iPhone developers may implement them in a proprietary client application without breaking any intellectual property laws.&lt;/p&gt;</description>
    </item>
    <item>
      <title>On Verifying Identity Using Cryptography</title>
      <link>https://guardianproject.info/2012/03/19/on-verifying-identity-using-cryptography/</link>
      <pubDate>Mon, 19 Mar 2012 11:27:51 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/19/on-verifying-identity-using-cryptography/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2012/03/identity.gif&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/identity-150x150.gif&#34; alt=&#34;&#34; width=&#34;150&#34; height=&#34;150&#34; class=&#34;alignleft size-thumbnail wp-image-1684&#34; /&gt;&lt;/a&gt;One of the most important uses of cryptography these days is verifying the identity of the other side of a digital conversation. That conversation could be between two people using OTR-encrypted IM, a web browser showing a bank website, a Debian Developer uploading a package to the Debian build server, an ssh client logging into an ssh server, and on and on. In all of these cases, cryptography is used to ensure that the software is indeed receiving replies from the expected entity. This happens by checking the current cryptographic key against one that is known to be correct. That is essential to the whole process. If you see the key for the first time, you have no way of knowing whether that is indeed the key you are expecting because there is no point of reference.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Adventures in Porting: GnuPG 2.1.x to Android!</title>
      <link>https://guardianproject.info/2012/03/15/adventures-in-porting-gnupg-2.1.x-to-android/</link>
      <pubDate>Thu, 15 Mar 2012 13:00:30 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/15/adventures-in-porting-gnupg-2.1.x-to-android/</guid>
      <description>&lt;p&gt;PGP started with Phil Zimmerman’s Pretty Good Privacy, which is now turned into an open IETF standard known as OpenPGP. These days, the reference OpenPGP platform seems to be &lt;a href=&#34;http://gnupg.org/&#34;&gt;GnuPG&lt;/a&gt;: its used by Debian and all its derivatives in the OS itself for verifying packages and more. It is also at the core of all Debian development work, allowing the very diffuse body of Debian, Ubuntu, etc developers to communicate and share work effectively while maintaining a high level of security. It is also used for email encryption in Thunderbird + Enigmail, Apple Mail + GPGMail, GNOME Evolution, KDE KMail, Microsoft Outlook + Gpg4win.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our new F-Droid App Repository (out of date!)</title>
      <link>https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository-out-of-date/</link>
      <pubDate>Thu, 15 Mar 2012 01:27:43 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository-out-of-date/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Update&lt;/strong&gt;: this blog post has been changed to reference our new FDroid repository at &lt;a href=&#34;https://guardianproject.info/fdroid&#34; target=&#34;_blank&#34;&gt;&lt;a href=&#34;https://guardianproject.info/fdroid&#34;&gt;https://guardianproject.info/fdroid&lt;/a&gt;&lt;/a&gt;. If you are still using the old one originally described here which has the URL &lt;a href=&#34;https://guardianproject.info/repo&#34;&gt;https://guardianproject.info/repo&lt;/a&gt;, you should switch to the new repo as soon as possible!&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;For all of you out there looking for a safe way to find and download apps outside of the Play Store (aka Android Market) or random, sketchy third-party app stores and file sharing sites, then your wait is over:&lt;/p&gt;</description>
    </item>
    <item>
      <title>VoIP Survey Results of NGOs, Human Rights Groups and Activists</title>
      <link>https://guardianproject.info/2012/03/07/voip-survey-results-of-ngos-human-rights-groups-and-activists/</link>
      <pubDate>Wed, 07 Mar 2012 18:58:29 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/07/voip-survey-results-of-ngos-human-rights-groups-and-activists/</guid>
      <description>&lt;p&gt;In November 2011, 25 individuals were surveyed using an online form, representing typical end-users, global journalists, activist and human rights organization perspectives (Thank you to all the participants!). The goal of the survey was to establish a baseline understanding of the types of tools and expectations our target user community has around making “telephone calls” over the internet, otherwise known as Voice over Internet Protocol (VoIP).&lt;/p&gt;&#xA;&lt;p&gt;This survey is part of our work on the &lt;a href=&#34;https://guardianproject.info/wiki/OSTN&#34;&gt;Open Secure Telephony Net (OSTN)&lt;/a&gt;. In summary, we believe there is too great a reliance upon closed systems, proprietary protocols, and expensive commercial solutions, among the very people and groups who need a verifiable secure system based on free software. While using GPG for email, or OTR-encryption for chat have become somewhat standards go-tos for these groups, there has not been the same progress made on the secure voice front. OSTN aims to change that, but before we can, we need to understand where our target user community stand today.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ObscuraCam v2 ALPHA (with video!)</title>
      <link>https://guardianproject.info/2012/03/02/obscuracam-v2-alpha-with-video/</link>
      <pubDate>Fri, 02 Mar 2012 12:20:34 -0400</pubDate>
      <guid>https://guardianproject.info/2012/03/02/obscuracam-v2-alpha-with-video/</guid>
      <description>&lt;p&gt;We’ve been making exciting progress with our work on &lt;a href=&#34;https://guardianproject.info/apps/securecam/&#34;&gt;ObscuraCam&lt;/a&gt;, part of the SecureSmartCam project with our partner &lt;a href=&#34;https://www.witness.org&#34;&gt;WITNESS&lt;/a&gt;. The biggest jump forward is the addition of video support, including automated face detection, pixelization and redaction.&lt;/p&gt;&#xA;&lt;p&gt;Screenshots below, and soon a video below (also at: &lt;a href=&#34;http://youtu.be/9hi4c_DCrkw&#34;&gt;http://youtu.be/9hi4c_DCrkw&lt;/a&gt;)&lt;/p&gt;&#xA;&lt;p&gt;Source code branch is here: &lt;a href=&#34;https://github.com/guardianproject/securesmartcam/tree/obscurav2&#34;&gt;https://github.com/guardianproject/securesmartcam/tree/obscurav2&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Latest ALPHA test build at: &lt;a href=&#34;https://github.com/guardianproject/SecureSmartCam/ObscuraCam-2.0-Alpha-2.apk/qr_code&#34;&gt;https://github.com/guardianproject/SecureSmartCam/ObscuraCam-2.0-Alpha-2.apk/qr_cod&lt;/a&gt;e&lt;/p&gt;&#xA;&lt;div id=&#39;gallery-5&#39; class=&#39;gallery galleryid-1590 gallery-columns-3 gallery-size-thumbnail&#39;&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120646.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120646-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120717.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120717-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120826.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-120826-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;br style=&#34;clear: both&#34; /&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121031.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121031-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121111.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121111-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121126.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121126-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;br style=&#34;clear: both&#34; /&gt;&#xA;  &lt;dl class=&#39;gallery-item&#39;&gt;&#xA;    &lt;dt class=&#39;gallery-icon landscape&#39;&gt;&#xA;      &lt;a href=&#39;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121143.png&#39;&gt;&lt;img width=&#34;150&#34; height=&#34;150&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/03/device-2012-03-02-121143-150x150.png&#34; class=&#34;attachment-thumbnail size-thumbnail&#34; alt=&#34;&#34; /&gt;&lt;/a&gt;&#xA;    &lt;/dt&gt;&#xA;  &lt;/dl&gt;&#xA;  &lt;br style=&#39;clear: both&#39; /&gt;&#xA;&lt;/div&gt;</description>
    </item>
    <item>
      <title>How many ways to store 5 numbers?</title>
      <link>https://guardianproject.info/2012/02/23/how-many-ways-to-store-5-numbers/</link>
      <pubDate>Thu, 23 Feb 2012 12:29:49 -0400</pubDate>
      <guid>https://guardianproject.info/2012/02/23/how-many-ways-to-store-5-numbers/</guid>
      <description>&lt;p&gt;At the core of all software that aims to be secure, private and anonymous is encryption, or as I think of it, amazing math tricks with really large numbers. These really large numbers can serve as a token of identity or the key to information locked away behind the encryption math. There are a number of different encryption methods commonly used based on different mathematical ideas, but they all rely on people managing sets of really large numbers, usually known as keys.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Free SIP Providers with ZRTP support</title>
      <link>https://guardianproject.info/2012/02/22/free-sip-providers-with-zrtp-support/</link>
      <pubDate>Wed, 22 Feb 2012 19:10:11 -0400</pubDate>
      <guid>https://guardianproject.info/2012/02/22/free-sip-providers-with-zrtp-support/</guid>
      <description>&lt;p&gt;This post is part of a series on our work researching the &lt;a href=&#34;https://guardianproject.info/tag/ostn/&#34;&gt;Open Secure Telephony Network&lt;/a&gt;. After you have &lt;a href=&#34;https://code.google.com/p/csipsimple/&#34;&gt;CSipSimple installed&lt;/a&gt; on your mobile handset, you will need a place to register a SIP username so you can contact others. The fastest way to get started with this is to use one of a handful of free SIP providers. I like the &lt;a href=&#34;https://www.ekiga.net/index.php?page=register&#34;&gt;Ekiga free SIP service&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/andwar/45070135/&#34; title=&#34;Red Telephone Boxes by Andwar, on Flickr&#34;&gt;&lt;img src=&#34;https://farm1.staticflickr.com/26/45070135_a1dd5889a7.jpg&#34; alt=&#34;Red Telephone Boxes&#34; width=&#34;500&#34; height=&#34;375&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source SIP Client for Android</title>
      <link>https://guardianproject.info/2012/02/22/open-source-sip-client-for-android/</link>
      <pubDate>Wed, 22 Feb 2012 16:12:25 -0400</pubDate>
      <guid>https://guardianproject.info/2012/02/22/open-source-sip-client-for-android/</guid>
      <description>&lt;p&gt;The first step in the &lt;a href=&#34;https://guardianproject.info/tag/ostn/&#34;&gt;Open Secure Telephony Network (OSTN)&lt;/a&gt; is a client. We can’t make a phone call without a phone. In this case there are three primary goals and a number of optional features. The primary goal is an application which speaks the SIP protocol for signalling. It must also speak the ZRTP protocol for peer to peer encryption key exchange. Finally the client must have source code freely available with a license that allows free redistribution.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Secure Telephony Network</title>
      <link>https://guardianproject.info/2012/02/22/open-secure-telephony-network/</link>
      <pubDate>Wed, 22 Feb 2012 15:39:26 -0400</pubDate>
      <guid>https://guardianproject.info/2012/02/22/open-secure-telephony-network/</guid>
      <description>&lt;p&gt;Over the last two months, I have been working on a project to research and develop a set of tools to provide secure peer to peer Voice over IP on the Android mobile platform. It is called the Open Secure Telephony Network, or &lt;a href=&#34;https://guardianproject.info/wiki/OSTN&#34;&gt;OSTN&lt;/a&gt;. This work is done under the umbrella of &lt;a href=&#34;https://guardianproject.info/&#34;&gt;The Guardian Project&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/stuartbarr/5893549665/&#34; title=&#34;Telephone wires by Stuart Barr, on Flickr&#34;&gt;&lt;img src=&#34;https://farm6.staticflickr.com/5119/5893549665_24943d362e.jpg&#34; alt=&#34;Telephone wires&#34; width=&#34;500&#34; height=&#34;333&#34; /&gt;&lt;br&gt;&#xA;&lt;/a&gt; &lt;em&gt;this is not the type of “open” we mean, and definitely not secure&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>February 2012: Project Update</title>
      <link>https://guardianproject.info/2012/02/09/february-2012-project-update/</link>
      <pubDate>Thu, 09 Feb 2012 17:19:06 -0400</pubDate>
      <guid>https://guardianproject.info/2012/02/09/february-2012-project-update/</guid>
      <description>&lt;p&gt;Through coordination with the Tor Project, we released &lt;strong&gt;Orbot&lt;/strong&gt; 1.0.7, which includes an embedded version of OpenSSL to assure we have the latest security enhancements for this critical cryptographic library. In addition, compatibility testing was done on Android 4.0 (Ice Cream Sandwich) and with the latest versions of Firefox Mobile. As always you can learn more and download Orbot in the Android Market and at &lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;https://guardianproject.info/apps/orbot&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;With the public awareness of internet censorship and surveillence growing thanks to SOPA, PIPA and CarrierIQ, not to mention the ongoing unrest in many regions if the world, we have seen a huge spike in interest and download of Orbot, Orweb and Gibberbot. Here are some notable links:&lt;br&gt;&#xA;&lt;a href=&#34;http://mobileactive.org/howtos/user-guide-to-orbot&#34;&gt;http://mobileactive.org/howtos/user-guide-to-orbot&lt;/a&gt;&lt;br&gt;&#xA;&lt;a href=&#34;http://www.chinagfw.org/2012/01/orbot-tor.html&#34;&gt;http://www.chinagfw.org/2012/01/orbot-tor.html&lt;/a&gt;&lt;br&gt;&#xA;&lt;a href=&#34;http://geeknews.cz/orbot-svobodnejsi-brouzdani-pro-android/352/&#34;&gt;http://geeknews.cz/orbot-svobodnejsi-brouzdani-pro-android/352/&lt;/a&gt;&lt;br&gt;&#xA;&lt;a href=&#34;http://www.101hacker.com/2012/01/10-must-have-free-android-apps.html&#34;&gt;http://www.101hacker.com/2012/01/10-must-have-free-android-apps.html&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introducing InformaCam</title>
      <link>https://guardianproject.info/2012/01/20/introducing-informacam/</link>
      <pubDate>Fri, 20 Jan 2012 13:58:26 -0400</pubDate>
      <guid>https://guardianproject.info/2012/01/20/introducing-informacam/</guid>
      <description>&lt;p&gt;These are interesting times, if you go by Times Magazine as an indicator. The magazine’s person of the year for 2011 was The Protester, preceded in 2010 by Facebook founder Mark Zuckerberg. Both entities partners with equal stake in freely sharing the digital content that shows the world what’s going on in it, at any time, from behind any pair of eyes.&lt;img class=&#34;alignright size-medium wp-image-1471&#34; alt=&#34;The Protester: Person of the Year&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2012/01/poy_cover-225x300.jpg&#34; width=&#34;225&#34; height=&#34;300&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2012/01/poy_cover-225x300.jpg 225w, https://guardianproject.info/wp-content/uploads/2012/01/poy_cover.jpg 474w&#34; sizes=&#34;(max-width: 225px) 100vw, 225px&#34; /&gt; Also casting in their lot with the others is Time Magazine’s 2006 person of the year, You: the You that puts the “you” in “user-generated content;” the You whose miasma of bits, bytes, and the powerful images they express are becoming increasingly problematic. Problematic and exciting. As governments, police forces, and other power players here and abroad crack down on voices of dissent, it is only You, The Protester, armed not with a press pass, but with a smartphone and a Twitter account, who brings the rest of the world its news. You do it mainly without either the support or permission of those in power, and this makes you a very important person in the world.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Strong Mobile Passwords with Yubikey USB Token</title>
      <link>https://guardianproject.info/2012/01/04/strong-mobile-passwords-with-yubikey-usb-token/</link>
      <pubDate>Wed, 04 Jan 2012 00:45:43 -0400</pubDate>
      <guid>https://guardianproject.info/2012/01/04/strong-mobile-passwords-with-yubikey-usb-token/</guid>
      <description>&lt;p&gt;We have been experimenting with the &lt;a href=&#34;http://www.yubico.com/yubikey&#34;&gt;Yubikey&lt;/a&gt;, a USB hardware password token, a bit over the last few weeks and would like to share our initial findings. We have not received any financial support or donation from Yubico for this work. We simply think they have a very affordable, interesting product that, due to its design, does *not* require any on-device driver software and can easily work with any Android device that supports USB Host/HID mode.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thoughts on Mobile Video for Activism</title>
      <link>https://guardianproject.info/2011/12/22/thoughts-on-mobile-video-for-activism/</link>
      <pubDate>Thu, 22 Dec 2011 16:39:43 -0400</pubDate>
      <guid>https://guardianproject.info/2011/12/22/thoughts-on-mobile-video-for-activism/</guid>
      <description>&lt;p&gt;I’ve co-written a blog post with Bryan Nunez of WITNESS, on some important concepts around using mobile video technology within activists and protest situations.  It is up now &lt;a href=&#34;https://blog.witness.org/2011/12/mobile-workflow-human-rights-video/&#34;&gt;on their blog&lt;/a&gt;, but here is a short excerpt:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Activists all over the world have turned to mobile phones to organize, coordinate and document their struggle.  Images and videos shot on mobile phones have been the standard for what revolution looks like in the public imagination.  We have seen iconic moments, captured in low resolution on mobile phones, captivate global audiences. We have moved from a handful of grainy clips uploaded hours or days after events unfold, to multiple livestreams, showing different angles on something happening right now. The Arab Spring, the #Occupy Movement, as well less politicized events like the &lt;a href=&#34;https://blog.witness.org/2011/08/citizen-media-in-the-london-riots/&#34;&gt;London and Vancouver riots&lt;/a&gt;&lt;a href=&#34;https://blog.witness.org/2011/08/citizen-media-in-the-london-riots/&#34;&gt; &lt;/a&gt;have shown us that the mobile phone is the recording device used to document the next breaking news story, especially if that story involves any sort of protest or activism.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQLCipher for Android v1 FINAL!</title>
      <link>https://guardianproject.info/2011/11/29/sqlcipher-for-android-v1-final/</link>
      <pubDate>Tue, 29 Nov 2011 18:17:47 -0400</pubDate>
      <guid>https://guardianproject.info/2011/11/29/sqlcipher-for-android-v1-final/</guid>
      <description>&lt;p&gt; &lt;/p&gt;&#xA;&lt;p&gt;Team GP along with the good folks at &lt;a href=&#34;http://zetetic.net/&#34;&gt;Zetetic&lt;/a&gt;, are happy to announce that we have reached &lt;em&gt;&lt;strong&gt;FINAL&lt;/strong&gt;&lt;/em&gt; on our first release (“v1” 0.0.6 build) of &lt;a href=&#34;https://guardianproject.info/code/sqlcipher/&#34;&gt;SQLCipher for Android&lt;/a&gt;. This means we consider this a production release, ready for shipping with your apps to provide for reliable, open-source, secure application data encryption.&lt;/p&gt;&#xA;&lt;p&gt;If you need a refresher, here is what the cross-platform, open-source &lt;a href=&#34;https://www.zetetic.net/sqlcipher/&#34;&gt;SQLCipher&lt;/a&gt; provides:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;SQLCipher is an &lt;a href=&#34;http://sqlite.org/&#34;&gt;SQLite&lt;/a&gt; extension that provides transparent 256-bit AES encryption of database files. Pages are encrypted before being written to disk and are decrypted when read back. Due to the small footprint and great performance it’s ideal for protecting embedded application databases and is well suited for mobile development.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Don’t Get Burned, Anonymize Your Fire</title>
      <link>https://guardianproject.info/2011/11/16/dont-get-burned-anonymize-your-fire/</link>
      <pubDate>Wed, 16 Nov 2011 22:37:24 -0400</pubDate>
      <guid>https://guardianproject.info/2011/11/16/dont-get-burned-anonymize-your-fire/</guid>
      <description>&lt;p&gt;Thanks to Jesse Vincent, aka &lt;a href=&#34;https://twitter.com/obra&#34;&gt;@obra&lt;/a&gt; of the &lt;a href=&#34;https://code.google.com/p/k9mail/&#34;&gt;K-9 mail project&lt;/a&gt;, we can say that &lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;Orbot (Tor on Android)&lt;/a&gt; and &lt;a href=&#34;https://guardianproject.info/apps/orweb&#34;&gt;Orweb (Privacy Browser)&lt;/a&gt; work just fine on the new &lt;a href=&#34;http://www.amazon.com/Kindle-Fire-Amazon-Tablet/dp/B0051VVOB2&#34;&gt;Amazon Kindle Fire&lt;/a&gt;. This means that while everything you do through Amazon’s store and browser are tracked and accounted for by Team Bezos, you can use our apps to more safely and privately access web content through the &lt;a href=&#34;https://torproject.org&#34;&gt;Tor network&lt;/a&gt;. While we are mostly &lt;a href=&#34;https://guardianproject.info/hardware/&#34;&gt;Nook Color fans&lt;/a&gt; around here, we know that the Kindle Fire is going to be quite popular this Christmas, and are glad to see that mobile privacy now has a toehold on the device from Seattle.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Two years in…</title>
      <link>https://guardianproject.info/2011/10/25/two-years-in/</link>
      <pubDate>Tue, 25 Oct 2011 15:11:39 -0400</pubDate>
      <guid>https://guardianproject.info/2011/10/25/two-years-in/</guid>
      <description>&lt;p&gt;Greetings mobile believers,&lt;/p&gt;&#xA;&lt;p&gt;I am about to head into the first ever Silicon Valley Human Rights Conference, aka #RightsCon, and though I would post some thoughts about the state of the Guardian Project, and the world in which we operate. RightsCon looks to be an amazing event (live streaming here: &lt;a href=&#34;https://www.rightscon.org/&#34;&gt;https://www.rightscon.org/&lt;/a&gt;), by an amazing organization (Access), and it comes at an interesting time in the world, and for our project.&lt;/p&gt;&#xA;&lt;p&gt;One year ago, I was invited to attend the first Liberation Technology held at Stanford University, a forebearer of sorts, to the RightsCon event today. It was a novel event, being that is was so forthright about the possibility of liberation from oppressors through ones and zeros. It was also quite informative, in that brought together a wide array of participants, including from Egypt, Syria and Yemen, and allowed them to speak directly about the variety of tactics they were using to defeat censors, route around filters, connect diasporas to their homeland and ultimately find fissures in the system that could slowly be mined and widened.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Progress on Mobile Video Privacy Tools</title>
      <link>https://guardianproject.info/2011/09/10/progress-on-mobile-video-privacy-tools/</link>
      <pubDate>Sat, 10 Sep 2011 04:36:11 -0400</pubDate>
      <guid>https://guardianproject.info/2011/09/10/progress-on-mobile-video-privacy-tools/</guid>
      <description>&lt;p&gt;&lt;em&gt;If you are  a developer you may just want to skip all the prose below, and just jump over to Github to find our new &lt;a href=&#34;https://github.com/guardianproject/android-ffmpeg&#34;&gt;FFMPEG on Android project&lt;/a&gt;{.vt-p} and build system. You can also check out our &lt;a href=&#34;https://github.com/guardianproject/SSCVideoProto&#34;&gt;SSCVideoProto Project&lt;/a&gt;{.vt-p} to understand how we are using it to redact faces and other identifying areas of HD video right on the Android phone itself. For more context, read on…&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Last October at the Open Video Conference 2010, the idea of a camera application that could be designed to understand the needs and requirements of the human rights community was born. During a &lt;a href=&#34;https://blog.witness.org/2010/10/ovc2010-opensubtitles/&#34;&gt;hackday hosted with WITNESS&lt;/a&gt;{.vt-p}, we proved that is was possible to take a feature like “Face Detection” which is built into the Android operating system, and turn it into a capability that could be used to protect people, by blurring, pixelating or removing faces that unintentionally appeared in a video filmed on a mobile phone. In the last year, through our partnership with &lt;a href=&#34;https://www.witness.org/cameras-everywhere/witness-labs&#34;&gt;WITNESS Labs&lt;/a&gt;, we have built on that concept, designing, developing and releasing apps and source code which move the state of the art in mobile video privacy and anonymity capabilities forward.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CACertMan app to address DigiNotar &amp; other bad CA’s</title>
      <link>https://guardianproject.info/2011/09/05/cacertman-app-to-address-diginotar-other-bad-cas/</link>
      <pubDate>Mon, 05 Sep 2011 03:29:00 -0400</pubDate>
      <guid>https://guardianproject.info/2011/09/05/cacertman-app-to-address-diginotar-other-bad-cas/</guid>
      <description>&lt;p&gt;As I expect many of you are aware, there was a major compromise to a Dutch Certificate Authority named “DigiNotar” recently, where they allowed SSL certs for domains like *.google.com, *.torproject.org and even *.cia.gov as well as *.*.com to be issued.&lt;/p&gt;&#xA;&lt;p&gt;It was brought up to the contribs of CyanogenMOD that they should probably remove the DigiNotar CA cert from the built-in Android OS keystore (located at /system/etc/security/cacerts.bks). Since they have 500k+ users, and can be more nimble than other ROM/device distributors, it was seen as a way to quickly address the problem, at least within their community. It turns out that it wasn’t as easy to convince them to do this (even though Mozilla, Google Chrome, IE, etc already had). You can read the thread, but it is still an open issue:&lt;br&gt;&#xA;h&lt;a href=&#34;ttp://code.google.com/p/cyanogenmod/issues/detail?id=4260&#34;&gt;ttp://code.google.com/p/cyanogenmod/issues/detail?id=4260&lt;/a&gt;{.vt-p}&lt;/p&gt;</description>
    </item>
    <item>
      <title>ACLU believes “Software Developers Can Put Privacy First!” (and so do we!)</title>
      <link>https://guardianproject.info/2011/08/19/aclu-believes-software-developers-can-put-privacy-first-and-so-do-we/</link>
      <pubDate>Fri, 19 Aug 2011 19:46:40 -0400</pubDate>
      <guid>https://guardianproject.info/2011/08/19/aclu-believes-software-developers-can-put-privacy-first-and-so-do-we/</guid>
      <description>&lt;p&gt;A &lt;a href=&#34;http://www.aclu-wa.org/blog/software-developers-can-put-privacy-first&#34;&gt;bit more on our big win&lt;/a&gt; in the Develop4Privacy contest, from Brian Robick at the &lt;a href=&#34;http://www.aclu-wa.org/&#34;&gt;ACLU of Washington State&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;When software developers put privacy first, everybody wins!&lt;/p&gt;&#xA;&lt;p&gt;Too often, user privacy is an afterthought in the design of computer software and online services.  In recent months, social networks have rolled back changes, cell phone manufacturers have altered the way that location tracking data is stored, and most recently, mobile application developers have been caught inappropriately collecting children’s personal data. For companies, the costs in lost consumer confidence, fines, and corrective measures can be substantial. Everyday users pay a price as well, and for victims of domestic violence, political protesters, whistleblowers, and others whose safety and livelihood could hinge on their privacy, those costs can be devastating.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing ObscuraCam v1 – Enhance Your Visual Privacy!</title>
      <link>https://guardianproject.info/2011/06/23/announcing-obscuracam-v1-enhance-your-visual-privacy/</link>
      <pubDate>Thu, 23 Jun 2011 21:28:20 -0400</pubDate>
      <guid>https://guardianproject.info/2011/06/23/announcing-obscuracam-v1-enhance-your-visual-privacy/</guid>
      <description>&lt;p&gt;We’re very happy to announce the beta release of &lt;a href=&#34;https://guardianproject.info/apps/securecam/&#34;&gt;ObscuraCam&lt;/a&gt; for Android. This is the first release from the SecureSmartCam project, a partnership with &lt;a href=&#34;https://www.witness.org/&#34;&gt;WITNESS&lt;/a&gt;, a leading human rights video advocacy and training organization. This is the result of an &lt;a href=&#34;https://github.com/guardianproject/SecureSmartCam/tree/obscurav1&#34;&gt;open-source development cycle&lt;/a&gt;, comprised of multiple sprints (and branches), that took place over the last five months. This “v1” release is just the first step towards the complete vision of the project.&lt;/p&gt;&#xA;&lt;p&gt;The goal of the SecureSmartCam project to to design and develop a new type of smartphone camera app that makes it simple for the user to respect the visual privacy, anonymity and consent of the subjects they photograph or record, while also enhancing their own ability to control the personally identifiable data stored inside that photo or video. Also, we think an app that allows you to pixelize your friends, disguise their faces and otherwise defend their privacy just a little bit, is a lot of fun and helps raise awareness about an important issue. In this first release we have focused on ‘obscura’ by optimizing the workflow of identity obfuscation in still images. Future releases will look at ‘informa,’ the process of properly gaining and recording informed consent from subjects, while also moving to video.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lil’ Debi: Easy Installer for Debian on Android</title>
      <link>https://guardianproject.info/2011/06/18/lil-debi-easy-installer-for-debian-on-android/</link>
      <pubDate>Sat, 18 Jun 2011 04:22:52 -0400</pubDate>
      <guid>https://guardianproject.info/2011/06/18/lil-debi-easy-installer-for-debian-on-android/</guid>
      <description>&lt;p&gt;Have an Android phone and want an easy Debian chroot running it?&lt;/p&gt;&#xA;&lt;p&gt;Alpha test our new app, &lt;a href=&#34;https://github.com/guardianproject/lildebi&#34;&gt;Lil’ Debi&lt;/a&gt;. It builds up a whole Debian chroot on your phone entirely using debootstrap. You choose the release, mirror, and size of the disk image, and away it goes. It could take up to an hour, then its done. Then it has a simple chroot manager that mounts and unmounts things, and starts/stops sshd if you have it installed. You can also then use ‘apt-get’ to install any package that is released for ARM processors. This includes things like GPG, Tor, TraceRouteTCP and other security and crypto tools.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot 1.0.5.2 now available</title>
      <link>https://guardianproject.info/2011/05/17/orbot-1.0.5.2-now-available/</link>
      <pubDate>Tue, 17 May 2011 19:43:30 -0400</pubDate>
      <guid>https://guardianproject.info/2011/05/17/orbot-1.0.5.2-now-available/</guid>
      <description>&lt;p&gt;Our flagship app, &lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;Orbot: Tor on Android&lt;/a&gt;, has been updated to version 1.0.5.2. It is available in the &lt;a href=&#34;https://market.android.com/details?id=org.torproject.android&amp;amp;feature=search_result&#34;&gt;Android Market&lt;/a&gt;, or through direct download from the &lt;a href=&#34;https://www.torproject.org/docs/android.html.en&#34;&gt;Tor Project’s website&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;This release fixes a number of long standing bigs, includes the latest and greatest release of Tor itself, cleans up the user interface a bit, and adds some new advanced options (you can specify your exit node country!). It also fixes an issue with our “Tor Everything” capability, that allowed some Android system network traffic to leak and bypass the Tor routing. Finally, it provides for compatibility for &lt;a href=&#34;https://code.google.com/p/cyanogenmod/issues/detail?id=1120&#34;&gt;CyanogenMOD 7&lt;/a&gt;, as well as Android Gingerbread and Honeycomb.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Announcing: SQLCipher for Android, Developer Preview r1</title>
      <link>https://guardianproject.info/2011/05/09/announcing-sqlcipher-for-android-developer-preview-r1/</link>
      <pubDate>Mon, 09 May 2011 22:45:09 -0400</pubDate>
      <guid>https://guardianproject.info/2011/05/09/announcing-sqlcipher-for-android-developer-preview-r1/</guid>
      <description>&lt;p&gt;After some major breakthroughs during last week’s development sprint, we’re extremely excited to announce &lt;a href=&#34;https://guardianproject.info/code/sqlcipher/&#34;&gt;SQLCipher for Android&lt;/a&gt;, Developer Preview r1. SQLCipher is an &lt;a href=&#34;http://sqlite.org/&#34;&gt;SQLite&lt;/a&gt; extension that provides transparent 256-bit AES encryption of database files. To date, it has been open-sourced, sponsored and maintained by &lt;a href=&#34;http://zetetic.net/&#34;&gt;Zetetic LLC&lt;/a&gt;, and we are glad to be able to extend their efforts to a new mobile platform. In the mobile space, SQLCipher has enjoyed widespread use in Apple’s &lt;a href=&#34;https://www.zetetic.net/sqlcipher/documentation/ios.html&#34;&gt;iOS&lt;/a&gt;, as well as &lt;a href=&#34;http://www.qtcentre.org/wiki/index.php?title=Building_QSQLITE_driver_with_AES-256_encryption_support&#34;&gt;Nokia / QT&lt;/a&gt; for quite some time. Given that Android &lt;a href=&#34;http://developer.android.com/guide/topics/data/data-storage.html#db&#34;&gt;by default&lt;/a&gt; provides integrated support for SQLite databases, our goal was to create an almost identical API for SQLCipher, so that developers of all skill level could use it, without a steep learning curve.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Our Foolish Hackday!</title>
      <link>https://guardianproject.info/2011/04/06/our-foolish-hackday/</link>
      <pubDate>Wed, 06 Apr 2011 21:51:12 -0400</pubDate>
      <guid>https://guardianproject.info/2011/04/06/our-foolish-hackday/</guid>
      <description>&lt;p&gt;We had a great group of people show up at our &lt;a href=&#34;https://guardianproject.info/wiki/%22Don%27t_Be_Fooled%22_Mobilehack_Day&#34;&gt;April 1st “Don’t Be Fooled” Hackday&lt;/a&gt; here at the OpenMobileLab in New York. There were users, there were devs, and all sorts of other people in between. We tracked some of the brainstormed ideas on an open etherpad at: &lt;a href=&#34;http://piratepad.net/bQPFn6FOhN&#34;&gt;http://piratepad.net/bQPFn6FOhN&lt;/a&gt; (text of this pasted in below).&lt;/p&gt;&#xA;&lt;p&gt;The main outputs of the hacking were &lt;a href=&#34;https://github.com/guardianproject/lildebi&#34;&gt;LilDebi&lt;/a&gt;, an updated Debian installer for Android, the beginnings of a &lt;a href=&#34;http://www.bitcoin.org/&#34;&gt;Bitcoin&lt;/a&gt; digital currency client, and another called &lt;a href=&#34;https://github.com/nathanfreitas/UpOnApp&#34;&gt;UpOn App&lt;/a&gt;, which uses the accelerometer and white noise generators in the device to stop your cellphone from spying on you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Growing Mobile Test Lab and Library</title>
      <link>https://guardianproject.info/2011/04/01/growing-mobile-test-lab-and-library/</link>
      <pubDate>Fri, 01 Apr 2011 00:32:08 -0400</pubDate>
      <guid>https://guardianproject.info/2011/04/01/growing-mobile-test-lab-and-library/</guid>
      <description>&lt;p&gt;At our new meatspace location in New York City, we are building up a library of mobile devices from around the world for open-source developers to use for testing, and specifically to help verify the security of apps running on different carrier configurations and hardware variables.&lt;/p&gt;&#xA;&lt;p&gt;Mostly our collection has come from picking up what we can, when we can, always with an eye towards anything a few generations back from the state of the art. If you’ve got any mobile hardware to donate, we would love to have it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>April 26: “Advancing the New Machine” at UC Berkeley</title>
      <link>https://guardianproject.info/2011/03/22/april-26-advancing-the-new-machine-at-uc-berkeley/</link>
      <pubDate>Tue, 22 Mar 2011 20:20:56 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/22/april-26-advancing-the-new-machine-at-uc-berkeley/</guid>
      <description>&lt;p&gt;I, along with a number of others from the Guardian Project core dev team, will be at the UC Berkeley’s Human Rights Center “Advancing the New Machine” conference at the end of April. I am on a panel regarding security in the context of human rights. We will also be presenting the Secure Smart Cam project with our partners at Witness. (&lt;a href=&#34;https://guardianproject.info/apps/securecam/&#34;&gt;https://guardianproject.info/apps/securecam/&lt;/a&gt;).&lt;/p&gt;&#xA;&lt;p&gt;You can learn more about the event here:&lt;br&gt;&#xA;&lt;a href=&#34;http://www.law.berkeley.edu/HRCweb/events/TechConference2011/index.html&#34;&gt;http://www.law.berkeley.edu/HRCweb/events/TechConference2011/index.html&lt;/a&gt;&lt;br&gt;&#xA;&lt;img class=&#34;alignnone&#34; src=&#34;https://www.law.berkeley.edu/HRCweb/events/TechConference2011/images/Conference-Logo-Large.jpg&#34; alt=&#34;&#34; width=&#34;394&#34; height=&#34;224&#34; /&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Guardian Project: General Update March 2011</title>
      <link>https://guardianproject.info/2011/03/21/guardian-project-general-update-march-2011/</link>
      <pubDate>Mon, 21 Mar 2011 05:18:48 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/21/guardian-project-general-update-march-2011/</guid>
      <description>&lt;p&gt;We have recently updated our general presentation on the project, and thought we would share it with you here. Please post any comments, questions or feedback right here, and we will get back to you shortly.&lt;br&gt;&#xA;&lt;a href=&#34;https://docs.google.com/present/view?id=ddr5dm94_493gvh263gt&#34;&gt;&lt;img class=&#34;alignnone size-full wp-image-910&#34; title=&#34;gp2011&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2011/03/gp2011.png&#34; alt=&#34;&#34; width=&#34;472&#34; height=&#34;348&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2011/03/gp2011.png 786w, https://guardianproject.info/wp-content/uploads/2011/03/gp2011-300x221.png 300w&#34; sizes=&#34;(max-width: 472px) 100vw, 472px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;You can find this &lt;a href=&#34;https://docs.google.com/present/view?id=ddr5dm94_493gvh263gt&#34;&gt;presentation on Google Docs&lt;/a&gt;, where you can also find it in downloadable, offline formats.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Photos from our January Hackday</title>
      <link>https://guardianproject.info/2011/03/10/photos-from-our-january-hackday/</link>
      <pubDate>Thu, 10 Mar 2011 17:41:18 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/10/photos-from-our-january-hackday/</guid>
      <description>&lt;p&gt;Back in January, we held a very excellent hackday at &lt;a href=&#34;http://eyebeam.org&#34;&gt;Eyebeam&lt;/a&gt; in New York. We rooted a NookColor, made encrypted calls over SIP, and generally had a full day of talking about the state of mobile security and privacy. Thanks to everyone who attended, and many thanks to _hc and Eyebeam for hosting!&lt;/p&gt;&#xA;&lt;p&gt;View the full &lt;a href=&#34;http://www.flickr.com/photos/eyebeam/sets/72157625808310021/&#34;&gt;Flickr photo set&lt;/a&gt;.&lt;br&gt;&#xA;&lt;a href=&#34;http://www.flickr.com/photos/eyebeam/5398828041/&#34; title=&#34;DSC_0083 by eyebeam, on Flickr&#34;&gt;&lt;img src=&#34;https://farm6.static.flickr.com/5053/5398828041_83c603319d.jpg&#34; alt=&#34;DSC_0083&#34; width=&#34;500&#34; height=&#34;335&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/eyebeam/5399436072/&#34; title=&#34;DSC_0121 by eyebeam, on Flickr&#34;&gt;&lt;img src=&#34;https://farm6.static.flickr.com/5172/5399436072_d9bcbbab50.jpg&#34; alt=&#34;DSC_0121&#34; width=&#34;500&#34; height=&#34;335&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Proxy Mobile Add-on 0.0.7 for Firefox on Android</title>
      <link>https://guardianproject.info/2011/03/04/proxy-mobile-add-on-0.0.7-for-firefox-on-android/</link>
      <pubDate>Fri, 04 Mar 2011 00:01:24 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/04/proxy-mobile-add-on-0.0.7-for-firefox-on-android/</guid>
      <description>&lt;p&gt;We’ve updated our &lt;a href=&#34;https://addons.mozilla.org/en-US/mobile/addon/proxy-mobile/&#34;&gt;Proxy Mobile&lt;/a&gt; add-on for &lt;a href=&#34;https://www.mozilla.com/en-US/mobile/&#34;&gt;Firefox on Android&lt;/a&gt; that allows user to configure their proxy settings. We first released this &lt;a href=&#34;https://guardianproject.info/2010/11/08/proxy-settings-add-on-for-firefox-mobile/&#34;&gt;back in November of last year&lt;/a&gt;, and have done our best to keep up with all the various beta updates of the browser. There are no features in this release, just a few small changes to make sure everything is running smoothly out there.&lt;/p&gt;&#xA;&lt;p&gt;To install the add-on, just search for “Proxy” from the add-on search menu within the Firefox settings screen. You can also point your Firefox mobile browser to this link: &lt;a href=&#34;https://guardianproject.info/downloads/proxymob-addon-0.0.7.xpi&#34;&gt;https://guardianproject.info/downloads/proxymob-addon-0.0.7.xpi&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Addressing a “Privacy Challenge” with Guardian</title>
      <link>https://guardianproject.info/2011/03/02/addressing-a-privacy-challenge-with-guardian/</link>
      <pubDate>Wed, 02 Mar 2011 20:39:18 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/02/addressing-a-privacy-challenge-with-guardian/</guid>
      <description>&lt;p&gt;Organized by the &lt;a href=&#34;http://aclunc.org/&#34;&gt;ACLU&lt;/a&gt;, &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt;, and &lt;a href=&#34;http://privacybydesign.ca/&#34;&gt;PrivacyByDesign.c&lt;/a&gt;a, the &lt;a href=&#34;http://www.develop4privacy.org/&#34;&gt;“Develop for Privacy Challenge”&lt;/a&gt; is an interesting new software development challenge that was announced last month. Developers (teams or individuals) have until May 31st to come up with apps which address this goal:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Develop apps for smartphones or other mobile devices that educate users about mobile privacy and give them the ability to claim or demand greater control of their own personal information.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;We don’t plan to compete in this contest ourselves, as we would rather support and encourage other developers to take a shot at it. Along those lines, we would really like to see developers use some of the &lt;a href=&#34;https://guardianproject.info/apps&#34;&gt;apps we have built&lt;/a&gt;, and &lt;a href=&#34;https://github.com/guardianproject&#34;&gt;code we have released&lt;/a&gt;, as part of their solutions. We have been putting together a large number of “lego” building blocks over the last year, just waiting for someone to come and put them together in a revolutionary way. Here is a breakdown of some of our more useful components:&lt;/p&gt;</description>
    </item>
    <item>
      <title>SECURED: HTC Wildfires get Guardian</title>
      <link>https://guardianproject.info/2011/03/01/secured-htc-wildfires-get-guardian/</link>
      <pubDate>Tue, 01 Mar 2011 23:23:14 -0400</pubDate>
      <guid>https://guardianproject.info/2011/03/01/secured-htc-wildfires-get-guardian/</guid>
      <description>&lt;p&gt;As we’ve &lt;a href=&#34;https://guardianproject.info/2010/11/09/secured-t-mobile-mytouch-4g-gets-guardian/&#34;&gt;posted&lt;/a&gt; in the past, one of the services we provide at The Guardian Project is customizing off-the-shelf Android phones to be generally more secure, privacy minded and updated with a powerful suite of trusted apps. We’ve gotten our mitts on a number of devices over the last few months in this regard, including: myTouch 4G, Motorola Milestone (GSM Droid), HTC Desire GSM, TMobile G2, Samsung Galaxy S, Nook Color, and Viewsonic 10″ GTablet. Whew! And if there’s one thing we’ve learned, it’s that some devices are much much harder to crack than others (cough cough… &lt;a href=&#34;http://alpharev.nl/&#34;&gt;Desire GSM’s hardened bootloader&lt;/a&gt;). With that in mind, we’ve recently added a &lt;a href=&#34;https://guardianproject.info/hardware/&#34;&gt;Hardware&lt;/a&gt; page to our site that lists the devices that we recommend for ‘Guardianization’.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A note on funding and our mention in Wired</title>
      <link>https://guardianproject.info/2011/02/23/a-note-on-funding-and-our-mention-in-wired/</link>
      <pubDate>Wed, 23 Feb 2011 16:50:38 -0400</pubDate>
      <guid>https://guardianproject.info/2011/02/23/a-note-on-funding-and-our-mention-in-wired/</guid>
      <description>&lt;p&gt;&lt;em&gt;A message from Nathan Freitas, lead developer on Guardian, who has a life long bad habit of being misquoted or selectively quoted, a phenomenon he must now blame on himself, and not the reporters who interview him.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Some of you might have seen a &lt;a href=&#34;http://www.wired.com/dangerroom/2011/02/mobile-tech-activists-wary-of-state-department-cash/&#34;&gt;story on Wired.com&lt;/a&gt; on which I am quoted, regarding the &lt;a href=&#34;http://www.state.gov/e/eeb/cip/netfreedom/index.htm&#34;&gt;US State Department’s “Internet Freedom” agenda&lt;/a&gt;. In particular, I was asked to comment on the entrepreneurial angle they are taking. Overall, I think the article is good in laying out the challenges for activist technology projects to take funding from the Government. I also think the motivations of the State Department’s effort are authentic and there is great potential to benefit the overall health of the Internet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Interviewed CHOMP.FM 007 Podcast</title>
      <link>https://guardianproject.info/2011/02/19/interviewed-chomp.fm-007-podcast/</link>
      <pubDate>Sat, 19 Feb 2011 09:58:04 -0400</pubDate>
      <guid>https://guardianproject.info/2011/02/19/interviewed-chomp.fm-007-podcast/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://chomp.fm&#34;&gt;CHOMP.FM&lt;/a&gt; is a weekly broadcast on information freedom, internet privacy and cyberculture.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;http://chomp.fm/img/chomp.gif&#34; alt=&#34;chomp.fm logo&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;We were excited to be interviewed and including in the latest episode, &lt;a href=&#34;http://chomp.fm/007/&#34;&gt;CHOMP.FM 007&lt;/a&gt;. Many thanks to Nadim Kobeissi for featuring us in his super-interesting and relevant show.&lt;/p&gt;&#xA;&lt;p&gt;You can listen to and &lt;a href=&#34;http://chomp.fm/audio/007.mp3&#34;&gt;download the mp3 directly&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stickers!</title>
      <link>https://guardianproject.info/2011/02/17/stickers/</link>
      <pubDate>Thu, 17 Feb 2011 13:44:05 -0400</pubDate>
      <guid>https://guardianproject.info/2011/02/17/stickers/</guid>
      <description>&lt;p&gt;If you see us in person, make sure to ask for one. Otherwise, if you really, really want some, we can mail them to you. Just fill out our “contact” form with your address, and we’ll do our best to pop a few in this thing called an envelope and they should get there in a week(!).&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2011/02/stickers.jpg&#34;&gt;&lt;img src=&#34;https://guardianproject.info/wp-content/uploads/2011/02/stickers.jpg&#34; alt=&#34;&#34; title=&#34;stickers&#34; width=&#34;451&#34; height=&#34;600&#34; class=&#34;alignleft size-full wp-image-631&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2011/02/stickers.jpg 451w, https://guardianproject.info/wp-content/uploads/2011/02/stickers-225x300.jpg 225w&#34; sizes=&#34;(max-width: 451px) 100vw, 451px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Create an encrypted file system on Android with LUKS</title>
      <link>https://guardianproject.info/2011/02/02/create-an-encrypted-file-system-on-android-with-luks/</link>
      <pubDate>Wed, 02 Feb 2011 23:29:15 -0400</pubDate>
      <guid>https://guardianproject.info/2011/02/02/create-an-encrypted-file-system-on-android-with-luks/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://code.google.com/p/cryptsetup/&#34;&gt;LUKS&lt;/a&gt; is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it not only facilitates compatibility among distributions, but also provides secure management of multiple user passwords.&lt;/p&gt;&#xA;&lt;p&gt;Building off the work from other &lt;a href=&#34;https://androidvoid.wordpress.com/2009/09/30/android-encryption-using-cryptsetup-and-luks/&#34;&gt;great&lt;/a&gt; &lt;a href=&#34;http://forum.xda-developers.com/showthread.php?t=866131&#34;&gt;sources&lt;/a&gt;, the Guardian Project hack team decided to take a crack at porting LUKS to Android recently, with the goal of creating a proof of concept build process that can be easily adapted to future projects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Seeking Slightly Paranoid Android Developers for Hire and Internships</title>
      <link>https://guardianproject.info/2010/11/10/seeking-slightly-paranoid-android-developers-for-hire-and-internships/</link>
      <pubDate>Wed, 10 Nov 2010 18:59:10 -0400</pubDate>
      <guid>https://guardianproject.info/2010/11/10/seeking-slightly-paranoid-android-developers-for-hire-and-internships/</guid>
      <description>&lt;p&gt;The Guardian Project is kicking off a three month project focused on finishing up our secure chat app, codenamed &lt;a href=&#34;https://guardianproject.info/apps/gibber&#34;&gt;Gibber&lt;/a&gt; but also known as “OtRChat”. We are looking for developers of all levels to join us in this work. We have already implemented the primary  &lt;a href=&#34;http://www.cypherpunks.ca/otr/&#34;&gt;“Off the Record” messaging&lt;/a&gt; functionality, and achieved interoperability with desktop clients such as Pidgin and AdiumX. From here, there is work to be done on implementing some unique features, cleaning up the user experience, and ensuring that the implementation is as secure as possible, providing all the necessary features for verifying and managing secure identities and sessions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SECURED: T-Mobile myTouch 4G gets Guardian</title>
      <link>https://guardianproject.info/2010/11/09/secured-t-mobile-mytouch-4g-gets-guardian/</link>
      <pubDate>Tue, 09 Nov 2010 23:26:59 -0400</pubDate>
      <guid>https://guardianproject.info/2010/11/09/secured-t-mobile-mytouch-4g-gets-guardian/</guid>
      <description>&lt;p&gt;One of the services we provide at the Guardian Project is taking any off the shelf Android phone and setting it up to be generally more secure, privacy minded and updated with a powerful suite of trusted apps. Today we were excited to get our hands on a myTouch 4G, manufactured by HTC and sold by T-Mobile. Really beautiful piece of hardware, and once we got our hands on it, a powerhouse of encrypted, anonymous and circumventing communications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Proxy Settings Add-on for Firefox Mobile</title>
      <link>https://guardianproject.info/2010/11/08/proxy-settings-add-on-for-firefox-mobile/</link>
      <pubDate>Mon, 08 Nov 2010 03:43:24 -0400</pubDate>
      <guid>https://guardianproject.info/2010/11/08/proxy-settings-add-on-for-firefox-mobile/</guid>
      <description>&lt;p&gt;The latest beta of &lt;a href=&#34;https://www.mozilla.com/en-US/mobile/&#34;&gt;Firefox 4 on Android&lt;/a&gt; is proving to be very usable, stable and an increasingly viable alternative to the built-in webkit browser. However, it is unfortunately lacking the ability to manually configure proxy settings through any sort of standard user interface. This is a common problem for Android, which also lacks the ability to set browser or system wide proxy settings. This has caused real issues for us with getting &lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;Orbot&lt;/a&gt; (aka “Tor on Android”) to work for un-rooted Android devices, because for routing through Tor to work, you must be able to set the HTTP or SOCKS proxy settings. Why this &lt;a href=&#34;https://code.google.com/p/android/issues/detail?id=1273&#34;&gt;very basic feature&lt;/a&gt; keeps getting missed or ignored is a mystery to us.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Video Conference: Panel and Hackday</title>
      <link>https://guardianproject.info/2010/09/30/open-video-conference-panel-and-hackday/</link>
      <pubDate>Thu, 30 Sep 2010 02:00:07 -0400</pubDate>
      <guid>https://guardianproject.info/2010/09/30/open-video-conference-panel-and-hackday/</guid>
      <description>&lt;p&gt;Nathan Freitas will be on a panel at the 2nd annual &lt;a href=&#34;http://www.openvideoconference.org/&#34;&gt;Open Video Conference&lt;/a&gt; in New York this Friday and Saturday. He will be on the panel entitled “Cameras Everywhere” led by our partners at &lt;a href=&#34;https://www.witness.org&#34;&gt;Witness&lt;/a&gt;, on Saturday at 3pm.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary&lt;/strong&gt;: Cameras Everywhere: Human Rights and Web Video – (&lt;em&gt;2:45 PM – 3:30 PM&lt;/em&gt;)&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: Once upon a time, video cameras were rare. Now they are ubiquitous—as are the opportunities to share, use, and re-use video. What are the limits and possibilities of an ethics of openness when it comes to human rights footage?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot Release 1.0 in the Android Market!</title>
      <link>https://guardianproject.info/2010/09/23/orbot-release-1.0-in-the-android-market/</link>
      <pubDate>Thu, 23 Sep 2010 22:21:06 -0400</pubDate>
      <guid>https://guardianproject.info/2010/09/23/orbot-release-1.0-in-the-android-market/</guid>
      <description>&lt;p&gt;It’s here! We’d like to officially announce the release of &lt;a href=&#34;https://guardianproject.info/apps/orbot/&#34;&gt;Orbot&lt;/a&gt; to the Android Market. After &lt;a href=&#34;https://guardianproject.info/2010/03/04/orbot-goes-beta/&#34;&gt;going beta&lt;/a&gt; back in March, we’ve seriously re-doubled our efforts for this release. By releasing Orbot to the Android Market, we suspect that our user base will eventually evolve towards the more ‘every day’ Android user – so our goal has been to create an experience that is simple yet informative, straightforward yet powerful. As a step towards that goal, we’ve spent some time creating a new &lt;a href=&#34;https://guardianproject.info/2010/07/29/orbot-update-new-setup-wizard-at-startup/&#34;&gt;setup wizard at Orbot start-up&lt;/a&gt; that walks you through the basics of what Orbot does and does not do. The last thing we want is for someone to be endangered because they didn’t understand how to protect themselves.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot Update: New Setup Wizard at Startup</title>
      <link>https://guardianproject.info/2010/07/29/orbot-update-new-setup-wizard-at-startup/</link>
      <pubDate>Thu, 29 Jul 2010 17:17:08 -0400</pubDate>
      <guid>https://guardianproject.info/2010/07/29/orbot-update-new-setup-wizard-at-startup/</guid>
      <description>&lt;p&gt;We’ve been working away at the 0.0.9 release of &lt;a href=&#34;https://guardianproject.info/apps/orbot&#34;&gt;Orbot&lt;/a&gt; over the last few months, and have put a decent amount of effort into usability. Specifically, we hoped to better communicate to users what it means to run Tor on your Android phone. In addition, we wanted to clearly lay out how the various configuration options help to improve your mobile web anonymity and ability to circumvent web filters and tracking by your mobile service provider.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Calling all Guardians – Alpha Testers Needed!</title>
      <link>https://guardianproject.info/2010/07/13/calling-all-guardians-alpha-testers-needed/</link>
      <pubDate>Tue, 13 Jul 2010 20:50:31 -0400</pubDate>
      <guid>https://guardianproject.info/2010/07/13/calling-all-guardians-alpha-testers-needed/</guid>
      <description>&lt;p&gt;Recently here at the Guardian Project we’ve been brainstorming &amp;amp; designing a new tool that we think will be core to enabling truly protected mobile communications . We think it will a big step in improving the user-friendliness of making your communications secure, anonymous and private , but we need your help to make it great.&lt;/p&gt;&#xA;&lt;p&gt;While it may give some of us a certain satisfaction to manually cobble together a suite of secure applications that suites our needs, this is by no means a long-term, wider-market solution. The tech community often forget (willfully or otherwise) that there is a huge group of non tech-savvy users for whom security and privacy are top level priorities. The ability to secure ones mobile communications should be accessible to all, through a solution that is beautiful, engaging and idiot-proof in its design. As we try to build that solution, we’re looking for your help in making sure that it meets each of those criteria.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To: Lockdown Your Mobile E-Mail</title>
      <link>https://guardianproject.info/2010/07/09/how-to-lockdown-your-mobile-e-mail/</link>
      <pubDate>Fri, 09 Jul 2010 11:00:25 -0400</pubDate>
      <guid>https://guardianproject.info/2010/07/09/how-to-lockdown-your-mobile-e-mail/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Update 2015-04-27&lt;/strong&gt;: &lt;em&gt;We now recommend &lt;a href=&#34;http://www.openkeychain.org/&#34; target=&#34;_blank&#34;&gt;OpenKeychain&lt;/a&gt; over APG, the app described in this blog post. The set up is drastically easier, so you probably don’t even need this HOWTO anymore. Start by downloading K-9 and &lt;a href=&#34;http://www.openkeychain.org/&#34; target=&#34;_blank&#34;&gt;OpenKeychain&lt;/a&gt;, then go into OpenKeychain and start the config there.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Over the past few years it’s become &lt;a href=&#34;https://www.youtube.com/watch?v=Gm8NdNy4wOM&#34;&gt;increasingly popular&lt;/a&gt; to sound the call that ‘&lt;a href=&#34;http://www.pcmag.com/article2/0,2817,2343209,00.asp&#34; title=&#34;dead&#34;&gt;email is dead&lt;/a&gt;{#y8a0}.’ And while many complementary forms of synchronous and asynchronous communication – from IM to social networking – have evolved since email first came on the scene, it’s hard to see email suddenly disappearing from its role as the most important way organizations communicate. I expect to be scooting around on my &lt;a href=&#34;https://en.wikipedia.org/wiki/Hoverboard&#34;&gt;hoverboard&lt;/a&gt; by the time email goes the way of the dinosaur.&lt;/p&gt;</description>
    </item>
    <item>
      <title>aPad / iRobot / Moons e7001 Teardown</title>
      <link>https://guardianproject.info/2010/06/05/apad-/-irobot-/-moons-e7001-teardown/</link>
      <pubDate>Sat, 05 Jun 2010 13:38:23 -0400</pubDate>
      <guid>https://guardianproject.info/2010/06/05/apad-/-irobot-/-moons-e7001-teardown/</guid>
      <description>&lt;p&gt;This is the aPad or iRobot Android 7″ tablet device from &lt;a rel=&#34;nofollow&#34; href=&#34;http://www.hiapad.com/&#34;&gt;&lt;a href=&#34;https://www.hiapad.com&#34;&gt;www.hiapad.com&lt;/a&gt;&lt;/a&gt;. I decided to tear mine apart, as the unit I received has a battery issue, and I hoped to see if I could find a bad solder point. In addition, I was curious to see just how hackable or extensible the hardware was. In the end, I was mostly surprised by how much of the thing is put together with tape. I suppose that is what you get for &amp;lt; $200 Android tablet! You can find the &lt;a href=&#34;http://www.hiapad.com/?p=9&amp;amp;lang=en&#34;&gt;full product overview on the Hiapad site&lt;/a&gt;. I have also pasted in the basic specs below.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To: Setup a Private VOIP Phone System for Android</title>
      <link>https://guardianproject.info/2010/05/26/how-to-setup-a-private-voip-phone-system-for-android/</link>
      <pubDate>Wed, 26 May 2010 05:53:54 -0400</pubDate>
      <guid>https://guardianproject.info/2010/05/26/how-to-setup-a-private-voip-phone-system-for-android/</guid>
      <description>&lt;div&gt;&#xA;  &lt;div&gt;&#xA;    &lt;strong&gt;MAY 2011: Learn more about our new efforts on the Open Secure Telephony Network at &lt;a href=&#34;https://guardianproject.info/wiki/OSTN&#34;&gt;https://guardianproject.info/wiki/OSTN&lt;/a&gt; – we currently recommend the &lt;a href=&#34;https://code.google.com/p/csipsimple/&#34;&gt;CSipSimple&lt;/a&gt; Android app instead of SIPDroid, for secure voice calls.&lt;/strong&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div&gt;&#xA;    Near the very top of Guardian’s open-source application suite &lt;a href=&#34;https://guardianproject.info/apps/&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;wish l&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;ist&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; is something that might seem like a no-brainer for a secure mobile device: voice. When we take into account network performance and audio fidelity requirements, as well as the International nature of Guardian’s target users (everything from average citizens to multi-national journalists or humanitarian organizations), the prospect of a truly real-time secure VOIP solution starts to reveal itself as quite the challenge. Fortunately, a number of efforts have been underway for some time on the Android platform. &lt;strong&gt;The following is an introduction to one such effort, and this post provides a very easy step-by-step how to enable your very own private mobile phone system.&lt;/strong&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;p&gt;&#xA;    &lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2010/05/sipdroidcall.png&#34;&gt;&lt;img class=&#34;alignleft size-full wp-image-337&#34; title=&#34;sipdroidcall&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2010/05/sipdroidcall.png&#34; alt=&#34;&#34; width=&#34;145&#34; height=&#34;241&#34; /&gt;&lt;/a&gt;&lt;a href=&#34;https://code.google.com/p/sipdroid/&#34;&gt;Sipdroid&lt;/a&gt;&lt;/span&gt; is an open-source SIP client that adds native SIP/VOIP to Android’s default dialer / contacts applications. You can find Sipdroid in the Android Market or alternatively can &lt;a href=&#34;https://code.google.com/p/sipdroid/downloads/list&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;download it here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. SIP (&lt;a href=&#34;https://en.wikipedia.org/wiki/Session_Initiation_Protocol&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;Session Initiation Protocol&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;) is the Internet standard for real-time voice and video communications. It’s a fundamental building block for many popular consumer VOIP products that you may have used – &lt;a href=&#34;https://www.youtube.com/watch?v=1XU06zbDBBA&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;Vonage&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; or &lt;a href=&#34;http://www.magicjack.com/&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;MagicJack&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; are two examples. Once installed and configured properly, sipdroid allows you to make &amp; receive calls over Wifi and 3G / EDGE data connections – which is a really powerful thing! A similar solution from &lt;a href=&#34;https://my.gizmo5.com/&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;Gizmo5&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; allowed many Android users to completely untangle themselves from mobile minutes and rely on a purely VOIP solution. Alas, new Gizmo signups were suspended after Google announced their &lt;a href=&#34;http://googlevoiceblog.blogspot.com/2009/11/google-welcomes-gizmo5.html&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;acquisition&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; – but we should all be excited to see what they can cook up as part of the official &lt;a href=&#34;https://www.google.com/voice&#34;&gt;&lt;span style=&#34;color: #0000ff;&#34;&gt;&lt;span&gt;Google Voice&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; team.&#xA;  &lt;/p&gt;</description>
    </item>
    <item>
      <title>Tor on a Tablet</title>
      <link>https://guardianproject.info/2010/05/25/tor-on-a-tablet/</link>
      <pubDate>Tue, 25 May 2010 16:22:01 -0400</pubDate>
      <guid>https://guardianproject.info/2010/05/25/tor-on-a-tablet/</guid>
      <description>&lt;p&gt;We recently acquired a Moons e-7001 “iRobot” tablet which runs Android 1.5. This device is also known as the “aPad”. It is a very basic iPad-clone, though honestly, it can’t really compare with the iPad in terms of quality of screen, build or general use. However, it does only cost $185, supports USB host mode, has a built-in camera, and it is running Android, an actual open-source operating system! It should also be pointed out that you can also now get the &lt;a href=&#34;http://www.amazon.com/Archos-Home-Tablet-Android-Black/dp/B003COZM2C/ref=sr_1_1?ie=UTF8&amp;amp;s=electronics&amp;amp;qid=1274748337&amp;amp;sr=1-1&#34;&gt;Archos 7 Android tablet&lt;/a&gt;, which is basically the same thing as this, from Amazon for $199.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Beem&#43;Orbot: Mobile Instant Messaging over Tor</title>
      <link>https://guardianproject.info/2010/05/10/beem-orbot-mobile-instant-messaging-over-tor/</link>
      <pubDate>Mon, 10 May 2010 16:32:01 -0400</pubDate>
      <guid>https://guardianproject.info/2010/05/10/beem-orbot-mobile-instant-messaging-over-tor/</guid>
      <description>&lt;p&gt;It is no secret that we are big fans of open-source here at Guardian. In fact, it is &lt;a href=&#34;https://github.com/guardianproject&#34;&gt;what we are made of&lt;/a&gt;. Guardian is not just a single app or just one phone, it is a vision for a more private and secure future for personal mobile telecommunications. As part of our work, we are constantly on the lookout other similar, like-minded projects that are developing open-source communications tools for the Android OS which we can make to work with our underlying security platform.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ultimate Droid and Orbot</title>
      <link>https://guardianproject.info/2010/04/11/ultimate-droid-and-orbot/</link>
      <pubDate>Sun, 11 Apr 2010 14:11:11 -0400</pubDate>
      <guid>https://guardianproject.info/2010/04/11/ultimate-droid-and-orbot/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;http://www.insecuresystem.org/2010/04/ultimate-droid-and-orbot.html&#34;&gt;InsecureSystem blog&lt;/a&gt; has a nice write-up on how to get Orbot running on your Droid:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;I’ve always been a supporter of net privacy and Tor in particular, and a friend of mine got me interested in &lt;a href=&#34;https://guardianproject.info/&#34;&gt;the guardian project&lt;/a&gt;, so I grabbed the beta version of &lt;a href=&#34;https://guardianproject.info/apps/orbot/&#34;&gt;Orbot&lt;/a&gt; just to try it out.. sweet, tor from my phone.&lt;/p&gt;&#xA;&lt;p&gt;Unfortunately the Smoked Glass Rom I was using didn’t support the Iptables modules necessary for the transparent proxy method orbot used for tunnelling apps through privoxy/tor. So, I was forced to try out some other Roms and their respective kernels.. okay, forced is a bad way to put it, it was a lot of fun.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ushahidi-Linda: “Testimony” &#43; “Protection”</title>
      <link>https://guardianproject.info/2010/03/10/ushahidi-linda-testimony--protection/</link>
      <pubDate>Wed, 10 Mar 2010 19:53:00 -0400</pubDate>
      <guid>https://guardianproject.info/2010/03/10/ushahidi-linda-testimony--protection/</guid>
      <description>&lt;p&gt;Ushahidi-linda (“Testimony” + “Protection” – &lt;em&gt;disclaimer: we don’t speak Swahili so this was a shot in the dark!&lt;/em&gt;)&lt;/p&gt;&#xA;&lt;p&gt;This is a fork of the &lt;a href=&#34;https://github.com/ushahidi/Ushahidi_Android&#34;&gt;Ushahidi on Android&lt;/a&gt; app, done as a way to prototype the implementation of increased security, anonymity and privacy for users viewing and submitting reports through &lt;a href=&#34;http://ushahidi.com&#34;&gt;Ushahidi&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://guardianproject.info/wp-content/uploads/2010/03/ushahidi_android_splash.png&#34;&gt;&lt;img class=&#34;size-full wp-image-199 alignleft&#34; title=&#34;ushahidi_android_splash&#34; src=&#34;https://guardianproject.info/wp-content/uploads/2010/03/ushahidi_android_splash.png&#34; alt=&#34;&#34; width=&#34;224&#34; height=&#34;336&#34; srcset=&#34;https://guardianproject.info/wp-content/uploads/2010/03/ushahidi_android_splash.png 320w, https://guardianproject.info/wp-content/uploads/2010/03/ushahidi_android_splash-200x300.png 200w&#34; sizes=&#34;(max-width: 224px) 100vw, 224px&#34; /&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Ushahidi is a platform that crowdsources crisis information, allowing anyone to submit crisis information through text messaging using a mobile phone, email or web form.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot goes Beta</title>
      <link>https://guardianproject.info/2010/03/04/orbot-goes-beta/</link>
      <pubDate>Thu, 04 Mar 2010 16:14:01 -0400</pubDate>
      <guid>https://guardianproject.info/2010/03/04/orbot-goes-beta/</guid>
      <description>&lt;p&gt;As announced on the &lt;a href=&#34;https://blog.torproject.org/blog/tor-android&#34;&gt;Tor Blog&lt;/a&gt;, an important development:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The Tor Project has been working very closely with &lt;a href=&#34;http://openideals.com/&#34;&gt;Nathan Freitas&lt;/a&gt; and &lt;a href=&#34;http://openideals.com/guardian/&#34;&gt;The Guardian Project&lt;/a&gt; to create an Android release. This is an early beta release and is not yet suitable for high security needs. The Android web browser is not protected by Torbutton and we have not yet developed an anonymous browser on the Android platform. Please be cautious with this release, it’s probably pretty fragile and it’s certainly not ready for serious use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MobileActive Helps Secure Citizen Journalists</title>
      <link>https://guardianproject.info/2010/03/02/mobileactive-helps-secure-citizen-journalists/</link>
      <pubDate>Tue, 02 Mar 2010 17:28:30 -0400</pubDate>
      <guid>https://guardianproject.info/2010/03/02/mobileactive-helps-secure-citizen-journalists/</guid>
      <description>&lt;p&gt;While we appreciate the mention in this new guide from &lt;a href=&#34;http://mobileactive.org&#34;&gt;MobileActive&lt;/a&gt;, we appreciate even more the hard work put into documenting practical solutions for citizen journalists that are available today. This guide covers both low and hi-tech approaches to using a mobile phone to document and share media, while still trying to protect your identity and safeguarding communication:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Mobile phones are used to compose stories, capture multi-media evidence and disseminate content to local and international audiences. This can be accomplished extremely quickly, making mobile media tools attractive to citizens and journalists covering rapidly unfolding events such as protests or political or other crises. The rise of mobiles has also helped extend citizen journalism into transient, poor or otherwise disconnected communities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot main screen redesign</title>
      <link>https://guardianproject.info/2010/03/01/orbot-main-screen-redesign/</link>
      <pubDate>Mon, 01 Mar 2010 21:48:06 -0400</pubDate>
      <guid>https://guardianproject.info/2010/03/01/orbot-main-screen-redesign/</guid>
      <description>&lt;p&gt;Here’s a few screenshots of the new “ACTIVATE ORBOT!” user interface. Just polishing up some of the features and doing a last few days of diligent testing before we release to the wider public.&lt;/p&gt;&#xA;&lt;p&gt;Overall, we want Tor on Android to be a one touch type experience, while still offering all the necessary options for configuration of bridges, rate limiting, etc.&lt;/p&gt;&#xA;&lt;p&gt;The coolest Android-only feature, which unfortunately requires your device to be rooted, is the ability to choose which apps on your device will be “Torified” automatically and transparently.&lt;/p&gt;</description>
    </item>
    <item>
      <title>One Solution for Push-to-Talk</title>
      <link>https://guardianproject.info/2010/02/11/one-solution-for-push-to-talk/</link>
      <pubDate>Thu, 11 Feb 2010 03:50:22 -0400</pubDate>
      <guid>https://guardianproject.info/2010/02/11/one-solution-for-push-to-talk/</guid>
      <description>&lt;p&gt;As part of rolling out the first-phase of &lt;a href=&#34;http://openideals.com/guardian&#34;&gt;The Guardian Project&lt;/a&gt;, I will be writing short reviews of existing applications for Android-based mobile phones that share our general goals or desired functionality. The goal of Guardian, in short, is to enable safe and secure communication for activists, organizers and advocates working for good around the world through the mobile phones they carry in their pockets.&lt;/p&gt;&#xA;&lt;p&gt;The Guardian project has no official relationship with these apps or their creators, but as we work towards developing our own unique software, we want to make sure to shine the spotlight on existing efforts that we admire and which are currently available. We’d also happily collaborate with any of them (or *you* if you are a developer reading this), and have them join our open-source efforts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Orbot: Initial Release (repost)</title>
      <link>https://guardianproject.info/2010/02/10/orbot-initial-release-repost/</link>
      <pubDate>Wed, 10 Feb 2010 20:26:23 -0400</pubDate>
      <guid>https://guardianproject.info/2010/02/10/orbot-initial-release-repost/</guid>
      <description>&lt;p&gt;&lt;em&gt;This was originally posted in October 2009.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;I’d like to make this post without much fanfare. Just looking to share information on the work I’ve been doing with the fantastically radical team over at the &lt;a href=&#34;https://www.torproject.org&#34;&gt;Tor Project&lt;/a&gt;, as part of my work on the &lt;a href=&#34;http://openideals.com/guardian&#34;&gt;Guardian Project&lt;/a&gt;. We have successfully ported the native C Tor app to Android and built an Android application bundle that installs, runs and provides the glue needed to make it useful to end users…. secure, anonymous access to the web via Tor on Android is now a reality. (&lt;em&gt;Update: Tor doesn’t magically encrypt all of your Internet activities, though. You should &lt;a href=&#34;https://www.torproject.org/download.html.en#Warning&#34;&gt;understand what Tor does and does not do for you&lt;/a&gt;.&lt;/em&gt;)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ideas and Inspiration</title>
      <link>https://guardianproject.info/2010/02/08/ideas-and-inspiration/</link>
      <pubDate>Mon, 08 Feb 2010 05:34:33 -0400</pubDate>
      <guid>https://guardianproject.info/2010/02/08/ideas-and-inspiration/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Watch the video below to hear directly from Google&amp;rsquo;s Android Team about the benefits of an open-source mobile OS.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/7Y4thikv-OM?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;p&gt;And now, another clip from one of our core, yet fictional, inspirations.&lt;/p&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/3efV2wqEjEY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Alan Bradley:&lt;/strong&gt; I still don&amp;rsquo;t get why you want to break into the system.&lt;br&gt;&#xA;&lt;strong&gt;Kevin Flynn:&lt;/strong&gt; [frustrated] Because, man, somewhere in one of these memories is the evidence!&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
