Delivery-Date: Mon, 04 Jan 2016 10:04:12 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 8CC251E00C8;
	Mon,  4 Jan 2016 10:04:10 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9858538C11;
	Mon,  4 Jan 2016 15:04:05 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D855638C09
 for <tor-talk@lists.torproject.org>; Mon,  4 Jan 2016 15:04:02 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id LzcigUz5Z79E for <tor-talk@lists.torproject.org>;
 Mon,  4 Jan 2016 15:04:02 +0000 (UTC)
Received: from gil.mayfirst.org (gil.mayfirst.org [216.66.23.48])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id BC2F438A8B
 for <tor-talk@lists.torproject.org>; Mon,  4 Jan 2016 15:04:02 +0000 (UTC)
X-Greylist: delayed 434 seconds by postgrey-1.34 at eugeni;
 Mon, 04 Jan 2016 15:04:02 UTC
Received: from gil.mayfirst.org (unknown [127.0.0.1])
 by gil.mayfirst.org (Postfix) with ESMTP id 1E06D5E7E
 for <tor-talk@lists.torproject.org>; Mon,  4 Jan 2016 09:56:44 -0500 (EST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender:
 nathanfreitas@gil.mayfirst.org) with ESMTPSA id F184C5E52
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailauth.nyi.internal (Postfix) with ESMTP id BD88E207D0
 for <tor-talk@lists.torproject.org>; Mon,  4 Jan 2016 09:56:44 -0500 (EST)
Received: from web5 ([10.202.2.215])
 by compute1.internal (MEProxy); Mon, 04 Jan 2016 09:56:44 -0500
Received: by web5.nyi.internal (Postfix, from userid 99)
 id 95336A6745D; Mon,  4 Jan 2016 09:56:44 -0500 (EST)
Message-Id: <1451919404.108243.482363962.0C70154E@webmail.messagingengine.com>
X-Sasl-Enc: NFD1rE58bxkzp7YQoBMUY9/BWhmzUShlQJr1LWwysAHA 1451919404
From: Nathan Freitas <nathan@freitas.net>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Mailer: MessagingEngine.com Webmail Interface - ajax-42cc5299
In-Reply-To: <512753.30303035396266393463353062356366@popretr.messagingengine.com>
References: <512753.30303035396266393463353062356366@popretr.messagingengine.com>
 <d4a1cd027349d14cbbb56984d36a792f@openmailbox.org>
Date: Mon, 04 Jan 2016 09:56:44 -0500
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [tor-talk] Torified Mobile Experience
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, Jan 1, 2016, at 07:22 PM, Spencer wrote:
> About a year ago, a discussion touched on what could be TorPhone, or 
> PhOnion, or whatever.
> 
> Following up with this, I find Mike Perry's original post is still 
> alive:
> 
> https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
> 
> But it has been upgraded to a formal project:
> 
> https://github.com/mission-impossible-android/mission-impossible-android

I would call that an unofficial formal project, but yes, really happy
that project is happening. I think it is the right approach.

> TOMY seems to be back burnered, which is fine given the growth of the 
> Guardian Project F-Droid repo over the past year:
> 
> https://dev.guardianproject.info/projects/libro/wiki/Tomy_Detachable_Secure_Mobile_System

Most of our energy got taken up with Orfox / Tor Browser and Pluggable
Transport porting, as well as work on the secure camera project, and our
new effort on mobile developer infrastructure,
deterministic/reproduceability and so on. All of this ultimately
contributes to projects like TOMY and MIA, but for now the idea of
booting a TAILS-like experience from an SD or USB drive is still not
widely practical.

> I inquired about the state of this and the briefly lived GuardianROM and 
> was redirected to Mike Perry's original post.
> 
> Since then, there seems to be some development that could be of interest 
> to followers of this topic:
> 
> NetHunter
> https://www.kali.org/kali-linux-nethunter/
> 
> AOSParadox
> http://www.xda-developers.com/aosparadox-a-new-rom-for-the-oneplus-one-with-a-fresh-perspective/
> https://github.com/AOSParadox
> 
> Both of these seem like easy targets; others would know better.

A few more related, interesting ideas:
https://copperhead.co/android/
https://people.torproject.org/~ioerror/skunkworks/moto_e/

> 
> Thoughts on this or the status of similar things?  Is anybody doing this 
> or something different?  I feel like there is an OS guarded secretly 
> under development :)

No secrets, just many smart people chipping away at a very big problem.
I think some of us have also been thinking about whether Android is the
best solution to build upon, or if we should look towards booting TAILS
on Windows Mobile hardware, or an Ubuntu mobile type solution (Qubes
Mobile?), or even maybe something based on Pi Zero or Project CHIP
device. 
https://www.kickstarter.com/projects/1598272670/chip-the-worlds-first-9-computer

Thanks for keeping hope alive, and keeping the interest going. I think
MIA on a Moto, Nexus or 1+1 is the best turnkey option right now.

+n
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

