[HacktionLab] New Open Source / Android Communication Tools?

Mick Fuzz mickfuzz at clearerchannel.org
Fri Jul 27 10:04:26 UTC 2012


Hey thanks Sam and Dave for those tips. They are great.


On 26/07/12 20:30, sam at bristolwireless.net wrote:
>
> Hi All
>
> This page contains some Android apps that may be of interest (with
> links):
> http://hacktivista.net/hacktionlab/index.php/TTFA2:_Mobile_Phone_Security_and_Android_Apps
>
>
> Cheers
>
> Sam
>
>
> ----
>
> Android
>
> The Guardian project are doing really useful work on Android platform
>
> ObscuraCam is a visual privacy app for photo and video, that gives you
> the power to better protect the identity of those captures in your
> photos, before you post them online. ObscuraCam will automatically
> detect faces that you can pixelate, redact (blackout) or protect with
> funny nose and glasses.
> Encrypted file system
>
> Cryptonite
> Encrypted SMS Messages
>
> TextSecure is recommended by the Guardian project
> Setting up a VPN on an Android Phone
>
> some info and a link to step by step instructions -
> http://en.flossmanuals.net/basic-internet-security/ch050_vpn-on-android/
> Encrypted Web browsing
>
> Orbot & Orweb - These two apps really go hand in hand, Orbot is the
> Android port of Tor a tool for anonymous online activity (whilst tor
> is not completely secure it's still a lot better than nothing) and
> Orweb is a browser made for it by The Guardian Project which is
> automatically configured to use Tor.
> Encrypted Email
>
> k9 mail
> Encrypted VOIP
>
> Csip simple
> Local wireless webserver
>
> Using Paw and the PirateBox plugin it is possible to run a webserver
> from your phone. Users see the wireless network broadcasting from your
> phone, connect to it, and are then redirected to a local webpage that
> also runs on your phone.
> This can be used for sharing bust card information at a demo. Or
> sharing the ObscuraCam.apk amongst a crowd for example. By default the
> app also installs a local chatroom that runs on the phone acting as
> the server. This should maybe be deleted for security reasons?
> Remote control
>
> Activists can be detained by authorities in order to stop their work
> or to gain access to information they are carrying on their persons.
> In these situations it is often difficult for that individual to
> anticipate their detention, leaving the data they are carrying
> unprotected and easily compromised. If a remote support team is able
> to determine that their team member has been detained, it should be
> possible for them to remotely control that member?s mobile device to
> either erase or disable access to the information it. There are a
> number of applications that can do this.
> Android lost is both free (as in beer, not libre) and allows control
> via SMS which is useful as it allows you to turn on 3G if it is turned
> off. (It does seem to use Google log in credentials, could anyone
> comment on whether this poses a security risk?
>
>
>
>
>
>
>
> Quoting Dave Hollis <david.hollis at netzwerkit.de>:
>
>> Hi Mick,
>>
>> I think Plone is worth a mention as a CMS. It is not a security
>> nightmare like anything PHP/Mysql software and it has a nice
>> interface for beginners.
>>
>> I've been using it for Netzwerk IT (a German and occassionally English
>> site -- see http://www.netzwerkit.de/ueber_uns/leaflet)
>> for workplace activists (usually and often deliberately
>> not unionised) since about 2002.
>>
>> Although it is by no means in anyway as comfortable as Plone, I also
>> think Zotonic (http://zotonic.com/) is worthy of menion. It's a
>> very interesting CMS. It is written in erlang (see
>> http://en.wikipedia.org/wiki/Erlang_%28programming_language%29) and is
>> incredibly fast. Admittedly, you do have to work to set it up, but it
>> seems that it could have a very interesting future.
>>
>> Best wishes,
>>
>> Dave
>>
>>
>> On Thu, Jul 26, 2012 at 10:13:31AM +0100, Mick Fuzz wrote:
>>> Hi there,
>>>
>>> I'm doing some work for Tactical Tech researching if the tools that
>>> they
>>> included in Message in a Box and Mobiles in a box are still relevant
>>> and
>>> if there are other ones that should be researched.
>>>
>>> To see all the tools mentioned in a big list, they are in messages
>>> http://messageinabox.tacticaltech.org/toolist and mobiles:
>>> http://mobiles.tacticaltech.org/lookattools.
>>>
>>> I'm on the case with the existing tools but it would be great to get in
>>> put on some of the newer tools out there that are useful. A lot has
>>> changed since 2008 - including Android tools.
>>>
>>> You would be doing me a favour supporting some work I'm doing but this
>>> info will also be useful for the Tech Tools for Activism website /
>>> leaflet too.
>>>
>>> I've created a wiki page or just email back the list with the name of
>>> the tool if it's a just a name you want to share.
>>>
>>> http://hacktivista.net/hacktionlab/index.php/New_tools_for_2012
>>>
>>> nice one
>>> Mick
>>>
>>> _______________________________________________
>>> HacktionLab mailing list
>>> HacktionLab at lists.aktivix.org
>>> https://lists.aktivix.org/mailman/listinfo/hacktionlab
>
>
>
>
>
> _______________________________________________
> HacktionLab mailing list
> HacktionLab at lists.aktivix.org
> https://lists.aktivix.org/mailman/listinfo/hacktionlab




More information about the HacktionLab mailing list