Categories: Security News

Edward Snowden Privacy Protection app turns your Android phone Into A Security System

Edward Snowden privacy protection app Haven turns your Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders.

App once installed, use your smartphone’s sensors microphone, motion detector, the light detector, and the cameras — to monitor the room for changes, and it logs everything it notices.

It was designed for journalists “human rights defenders, and people at risk of forced disappearance to create a new kind of herd immunity.” Guardian project reads.

How it works

Haven combines your smartphone’s sensors and to send real-time encrypted alerts, it uses the most secure communication channel like Signal and Tor.

If you lock your phone and kept in the hotel safe with Haven at the top, then if someone opens the safe the phone light meter may sense the change in lighting, the microphone can detect a sound, the accelerometer can detect a change in motion and camera might capture a snapshot of the attacker’s face.
HavenHaven

Once the sensors triggered it will send alerts through SMS and Signal app, also the event logs can be captured through Tor Onion Service and it also keeps on-device log events.

Snowden recognizes that Haven can’t stop an intruder hooked on physically harming somebody. In any case, by basically identifying and recording their presence.

If you’re the secret police making people disappear, Haven changes the calculus of risk you have to go through,” evil maid attacks are not in wild. we’re talking about people who can’t go into the pool without their laptops,” said Snowden.

Now the app is available from Google Play Store and the code available on Github.”WIRED says with their initial tests of Haven’s beta version, the app successfully detected and alerted us to any attempts to approach a laptop on an office desk, reliably sending photos of would-be evil maids over Signal“.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems across…

3 hours ago

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21 popular…

3 hours ago

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its focus…

4 hours ago

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals

The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has…

4 hours ago

Hackers Use Pahalgam Attack-Themed Decoys to Target Indian Government Officials

The Seqrite Labs APT team has uncovered a sophisticated cyber campaign by the Pakistan-linked Transparent…

4 hours ago

LUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands

The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant…

4 hours ago