Much of the content on this blog will be syndicated from the blogs of my projects related to hacking on Android and manipulating the single-board computing hardware in Android phones. When I say hacking I mean it primarily in the original sense of the word hacking, which focuses on using computers to build new things that are useful or interesting, but also at times in the incorrect, but commonly used sense which concerns security testing and the relevant, interesting areas where they overlap today. I am particularly interested in Android-Based wireless Mobile Ad-Hoc Networks and Android ROM and Kernel customization. decentralization and how it can enable account-less, end-to-end encrypted communication which exists beyond the control of a third party, concepts which are realized in some form or another with i2p, cjdns, TOX, and Twisterd, and how this relates to how the network "routes around censorship."
My Projects
CyanogenMod on the Centura:
This project is my attempt to generate a working, current CyanogenMod-Like
device tree which can be used to create Android ROM's for the Samsung Galaxy
Centura mobile device based on the Qualcomm MSM7x27A board. I picked this board
to make CyanogenMod easily accessible to people on phones they can afford to
brick if something goes wrong. The Centura is a 30-50 dollar phone. I also
fiddle a bit with ROM's for the ZTE force, a much more powerful budget phone.
Status: WIP with occasional useable releases.
ig88ROM
ig88ROM is my attempt at developing a custom ROM which can be built using a
CyanogenMod device tree which includes a range of amusing pranks, useful tips,
and dirty tricks presented with explanations for how they work and how they are
performed in order to make how exploits work and how they can affect you more
accessible. This is intended only for educational and professional purposes
where legally allowed, whether I agree with the law or not. If you use it
otherwise, I warned you, don't blame me if you get caught, I am telling you NOT
to use it for illegal purposes.
Status: WIP with some usable components.
freeLAIR
freeLAIR is the 5th and final rewrite of the video game I frequently used to
explore programming concepts I was interested in. It's a procedurally generated
RPG inspired by the Rogue-likes, but which deviates by being multiplayer and
played in real-time by nature. It will initally be for desktop GNU/Linux and
eventually for Windows and OSX. freeLAIR may be the first multiplayer game to
use the peer-to-peer Tox protocol for multiplayer communication.
Status: Beginning of the final rewrite, which won't take long believe it or
not.
libtox++ TOX_Net2
libtox++ is a C++ wrapper for the Tox library which is not a one-to-one
wrapper in order to make it easy to use modern C++(C++11, 14) features in C++
applications which make use of TOX.
TOXNet2 is a library and partial TOX client implementation which aims to make
incorporating TOX into your application for communication as easy as using the
widely understood SDLNet Library.
Status: Definitely not ready yet. But soon.
Smaller Projects
Rotation Lock Plus Landscape
A fork of the Free and Open Source "Rotation Lock" app which adds landscape support. Status: Released.
CardCoin
A alternate coin which is intended to be used to track digital trading cards. Status: Barely started. Might take a while.
Projects I'm interested in/Think everyone should use
TOX
Tox is a free and open-source, peer-to-peer, encrypted instant messaging and video calling software. The stated goal of the project is to provide secure yet easily accessible communication for everyone. Users are assigned a public and private key, and they connect to each other directly in a fully distributed, peer-to-peer network. Users have the ability to message friends, join chat rooms with friends or strangers, and send each other files.
i2p/i2pd
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
cjdns
Cjdns is a networking protocol, a system of digital rules for message exchange between computers. The philosophy behind cjdns is that networks should be easy to set up, protocols should scale up smoothly and security should be ubiquitous. Cjdns implements an encrypted IPv6 network using public key cryptography for network address allocation and a distributed hash table for routing.
Twisterd
twister is the fully decentralized P2P microblogging platform leveraging from the free software implementations of Bitcoin and BitTorrent protocols.
Post a Comment