Sunday, April 12, 2015

Projects

Much of the content on this blog will be syndicated from the blogs of my projects related to hacking on Android and manipulating the single-board computing hardware in Android phones. When I say hacking I mean it primarily in the original sense of the word hacking, which focuses on using computers to build new things that are useful or interesting, but also at times in the incorrect, but commonly used sense which concerns security testing and the relevant, interesting areas where they overlap today. I am particularly interested in Android-Based wireless Mobile Ad-Hoc Networks and Android ROM and Kernel customization. decentralization and how it can enable account-less, end-to-end encrypted communication which exists beyond the control of a third party, concepts which are realized in some form or another with i2p, cjdns, TOX, and Twisterd, and how this relates to how the network "routes around censorship."

My Projects

CyanogenMod on the Centura:

This project is my attempt to generate a working, current CyanogenMod-Like device tree which can be used to create Android ROM's for the Samsung Galaxy Centura mobile device based on the Qualcomm MSM7x27A board. I picked this board to make CyanogenMod easily accessible to people on phones they can afford to brick if something goes wrong. The Centura is a 30-50 dollar phone. I also fiddle a bit with ROM's for the ZTE force, a much more powerful budget phone.
Status: WIP with occasional useable releases.

ig88ROM

ig88ROM is my attempt at developing a custom ROM which can be built using a CyanogenMod device tree which includes a range of amusing pranks, useful tips, and dirty tricks presented with explanations for how they work and how they are performed in order to make how exploits work and how they can affect you more accessible. This is intended only for educational and professional purposes where legally allowed, whether I agree with the law or not. If you use it otherwise, I warned you, don't blame me if you get caught, I am telling you NOT to use it for illegal purposes.
Status: WIP with some usable components.

freeLAIR

freeLAIR is the 5th and final rewrite of the video game I frequently used to explore programming concepts I was interested in. It's a procedurally generated RPG inspired by the Rogue-likes, but which deviates by being multiplayer and played in real-time by nature. It will initally be for desktop GNU/Linux and eventually for Windows and OSX. freeLAIR may be the first multiplayer game to use the peer-to-peer Tox protocol for multiplayer communication.
Status: Beginning of the final rewrite, which won't take long believe it or not.

libtox++ TOX_Net2

libtox++ is a C++ wrapper for the Tox library which is not a one-to-one wrapper in order to make it easy to use modern C++(C++11, 14) features in C++ applications which make use of TOX. TOXNet2 is a library and partial TOX client implementation which aims to make incorporating TOX into your application for communication as easy as using the widely understood SDLNet Library.
Status: Definitely not ready yet. But soon.

Smaller Projects

Rotation Lock Plus Landscape

A fork of the Free and Open Source "Rotation Lock" app which adds landscape support. Status: Released.

CardCoin

A alternate coin which is intended to be used to track digital trading cards. Status: Barely started. Might take a while.

Projects I'm interested in/Think everyone should use

TOX

Tox is a free and open-source, peer-to-peer, encrypted instant messaging and video calling software. The stated goal of the project is to provide secure yet easily accessible communication for everyone. Users are assigned a public and private key, and they connect to each other directly in a fully distributed, peer-to-peer network. Users have the ability to message friends, join chat rooms with friends or strangers, and send each other files.

i2p/i2pd

I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.

cjdns

Cjdns is a networking protocol, a system of digital rules for message exchange between computers. The philosophy behind cjdns is that networks should be easy to set up, protocols should scale up smoothly and security should be ubiquitous. Cjdns implements an encrypted IPv6 network using public key cryptography for network address allocation and a distributed hash table for routing.

Twisterd

twister is the fully decentralized P2P microblogging platform leveraging from the free software implementations of Bitcoin and BitTorrent protocols.

Post a Comment

 
Cmotc © | Partner: Toxigon ©
CMotC © 2015 - Designed by Templateism.com