I live in the beautiful country of Russia, but we have a big security problem. If someone perceives the right to freedom of speech, prescribed in the Constitution of the country literally, then he may face big problems.
Hence, the decision was made to create a security build for mobile devices. First of all, smartphones.
I have a few questions for the distinguished community.
1. Can native encryption of Android smartphones be hacked?
2. {Mod edit}
3. Is it possible to protect the basic data of the SIM card from physical access, possibly using some kind of manipulation? Or make a remote SIM card? Or just scrubbing data off the surface? Or glue it tightly so that the chip will die when removed?
4. Virtualization on an android smartphone, our people are poor, not everyone can afford to buy a second device for private conversations.
5. Is it possible to download an android from a SD card, like a live CD?
6. Is it possible to effectively protect traffic from IP leaks through the torus? On stationary PCs, it turned out to be the most expedient to use Whonix, how are things going on android?
7. Is it possible to carry out all these manipulations, or do some of them be carried out without having root-rights on the device? The goal is to create an efficient and easy-to-use security build for the general public.
If you can answer at least some of the questions, I am very grateful in advance.
Hence, the decision was made to create a security build for mobile devices. First of all, smartphones.
I have a few questions for the distinguished community.
1. Can native encryption of Android smartphones be hacked?
2. {Mod edit}
3. Is it possible to protect the basic data of the SIM card from physical access, possibly using some kind of manipulation? Or make a remote SIM card? Or just scrubbing data off the surface? Or glue it tightly so that the chip will die when removed?
4. Virtualization on an android smartphone, our people are poor, not everyone can afford to buy a second device for private conversations.
5. Is it possible to download an android from a SD card, like a live CD?
6. Is it possible to effectively protect traffic from IP leaks through the torus? On stationary PCs, it turned out to be the most expedient to use Whonix, how are things going on android?
7. Is it possible to carry out all these manipulations, or do some of them be carried out without having root-rights on the device? The goal is to create an efficient and easy-to-use security build for the general public.
If you can answer at least some of the questions, I am very grateful in advance.
Last edited by a moderator: