Tuesday, May 20, 2025
HomeSecurity NewsEdward Snowden Privacy Protection app turns your Android phone Into A Security...

Edward Snowden Privacy Protection app turns your Android phone Into A Security System

Published on

SIEM as a Service

Follow Us on Google News

Edward Snowden privacy protection app Haven turns your Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders.

App once installed, use your smartphone’s sensors microphone, motion detector, the light detector, and the cameras — to monitor the room for changes, and it logs everything it notices.

It was designed for journalists “human rights defenders, and people at risk of forced disappearance to create a new kind of herd immunity.” Guardian project reads.

How it works

Haven combines your smartphone’s sensors and to send real-time encrypted alerts, it uses the most secure communication channel like Signal and Tor.

If you lock your phone and kept in the hotel safe with Haven at the top, then if someone opens the safe the phone light meter may sense the change in lighting, the microphone can detect a sound, the accelerometer can detect a change in motion and camera might capture a snapshot of the attacker’s face.
- Advertisement - Google News
Haven

Once the sensors triggered it will send alerts through SMS and Signal app, also the event logs can be captured through Tor Onion Service and it also keeps on-device log events.

Snowden recognizes that Haven can’t stop an intruder hooked on physically harming somebody. In any case, by basically identifying and recording their presence.

If you’re the secret police making people disappear, Haven changes the calculus of risk you have to go through,” evil maid attacks are not in wild. we’re talking about people who can’t go into the pool without their laptops,” said Snowden.

Now the app is available from Google Play Store and the code available on Github.”WIRED says with their initial tests of Haven’s beta version, the app successfully detected and alerted us to any attempts to approach a laptop on an office desk, reliably sending photos of would-be evil maids over Signal“.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials

Cybercriminals are leveraging the Python Package Index (PyPI) to distribute malicious tools designed to...

Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns

Biotechnology giant Regeneron Pharmaceuticals has emerged as the successful bidder in the bankruptcy auction...

CISA Includes MDaemon Email Server XSS Flaw in KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability affecting...

Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Targeted Attacks

Russian organizations have become prime targets of a sophisticated malware campaign deploying the Pure...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...