Saturday, May 3, 2025
HomeSecurity NewsEdward Snowden Privacy Protection app turns your Android phone Into A Security...

Edward Snowden Privacy Protection app turns your Android phone Into A Security System

Published on

SIEM as a Service

Follow Us on Google News

Edward Snowden privacy protection app Haven turns your Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders.

App once installed, use your smartphone’s sensors microphone, motion detector, the light detector, and the cameras — to monitor the room for changes, and it logs everything it notices.

It was designed for journalists “human rights defenders, and people at risk of forced disappearance to create a new kind of herd immunity.” Guardian project reads.

How it works

Haven combines your smartphone’s sensors and to send real-time encrypted alerts, it uses the most secure communication channel like Signal and Tor.

If you lock your phone and kept in the hotel safe with Haven at the top, then if someone opens the safe the phone light meter may sense the change in lighting, the microphone can detect a sound, the accelerometer can detect a change in motion and camera might capture a snapshot of the attacker’s face.
- Advertisement - Google News
Haven

Once the sensors triggered it will send alerts through SMS and Signal app, also the event logs can be captured through Tor Onion Service and it also keeps on-device log events.

Snowden recognizes that Haven can’t stop an intruder hooked on physically harming somebody. In any case, by basically identifying and recording their presence.

If you’re the secret police making people disappear, Haven changes the calculus of risk you have to go through,” evil maid attacks are not in wild. we’re talking about people who can’t go into the pool without their laptops,” said Snowden.

Now the app is available from Google Play Store and the code available on Github.”WIRED says with their initial tests of Haven’s beta version, the app successfully detected and alerted us to any attempts to approach a laptop on an office desk, reliably sending photos of would-be evil maids over Signal“.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications

Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to...

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid...

NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys

Researchers have uncovered significant security vulnerabilities in NVIDIA Riva, a breakthrough AI speech technology...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...