{"id":103954,"date":"2017-12-25T12:00:19","date_gmt":"2017-12-25T12:00:19","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=103954"},"modified":"2017-12-25T10:39:52","modified_gmt":"2017-12-25T10:39:52","slug":"edward-snowdens-new-app-uses-your-smartphone-to-physically-guard-your-laptop","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/12\/edward-snowdens-new-app-uses-your-smartphone-to-physically-guard-your-laptop\/","title":{"rendered":"Edward Snowden\u2019s New App Uses Your Smartphone to Physically Guard Your Laptop"},"content":{"rendered":"<div id=\"attachment_103955\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-103955\" class=\"wp-image-103955\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop-1024x512.jpg\" alt=\"\" width=\"500\" height=\"250\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop-1024x512.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop-300x150.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop-768x384.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop.jpg 1440w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-103955\" class=\"wp-caption-text\">Illustration: The Intercept<\/p><\/div>\n<p><em>22 Dec 2017 &#8211; <\/em>Like many other journalists, activists, and software developers I know, I carry my laptop everywhere while I\u2019m traveling. It contains sensitive information; messaging app conversations, email, password databases, encryption keys, unreleased work, web browsers\u00a0 logged into various accounts, and so on. My <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/04\/27\/encrypting-laptop-like-mean\/\" >disk is encrypted<\/a>, but all it takes to bypass this protection is for an attacker \u2014 a malicious hotel housekeeper, or \u201c<a target=\"_blank\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2009\/10\/evil_maid_attac.html\" >evil maid<\/a>,\u201d for example \u2014 to spend a few minutes physically tampering with it without my knowledge. If I come back and continue to use my compromised computer, the attacker could gain access to everything.<\/p>\n<p>Edward Snowden and his friends have a solution. The NSA whistleblower and a team of collaborators have been working on a new <a target=\"_blank\" href=\"https:\/\/github.com\/guardianproject\/haven\" >open source<\/a> Android app called <a target=\"_blank\" href=\"https:\/\/guardianproject.github.io\/haven\/\" >Haven<\/a> that you install on a spare smartphone, turning the device into a sort of sentry to watch over your laptop. Haven uses the smartphone\u2019s many sensors \u2014 microphone, motion detector, light detector, and cameras \u2014 to monitor the room for changes, and it logs everything it notices. The first public beta version of Haven has officially been released; it\u2019s available in the <a target=\"_blank\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.havenapp.main\" >Play Store<\/a> and on <a target=\"_blank\" href=\"https:\/\/guardianproject.github.io\/haven-nightly\/\" >F-Droid<\/a>, an open source app store for Android.<\/p>\n<p>Snowden is helping to develop the software through a project he leads at the Freedom of the Press Foundation, which receives funding from The Intercept\u2019s parent company. I sit on the FPF board with Snowden, am an FPF founder, and lent some help developing the app, including through nine months of testing. With that noted, I\u2019ll be forthright about the product\u2019s flaws below, and have solicited input for this article from people not involved in the project.<\/p>\n<p>Also collaborating on Haven is the Guardian Project, a global collective of mobile security app developers.<\/p>\n<p>Haven is an external solution to a problem computer makers traditionally attempted to handle from within their devices. Some laptops, for example, offer \u201csecure boot\u201d through a special tamper-resistant chip called a Trusted Platform Module, which tries to ensure that the computer\u2019s bootloader code hasn\u2019t been modified to be malicious. But there are various ways this could go wrong: there can be bugs in the code that does the verification, attackers could connive to get their code marked as trustworthy, or malicious code could be inserted after the bootloader. Some computer users have tried the low-tech solution of <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/jp5xwy\/itll-take-more-than-glitter-nail-polish-to-stop-snooping\" >painting glitter nail polish<\/a> on their laptop screws, creating a sort of seal that would be broken during a tampering attempt.<\/p>\n<p>\u201cDue to how current laptops, and probably most other computing devices, are made today, it is virtually impossible to systematically check later if the laptop has been compromised or not,\u201d said Joanna Rutkowska, founder of the secure Qubes operating system, who invented the term \u201cevil maid\u201d in 2009 as part of her work as a security researcher.<\/p>\n<p>httpv:\/\/www.youtube.com\/watch?v=Fr0wEsISRUw<\/p>\n<p>Here\u2019s how Haven might work: You lock your laptop in a hotel safe \u2014\u00a0 <a target=\"_blank\" href=\"https:\/\/www.huffingtonpost.com\/entry\/hotel-safes-not-safe-secure_us_55f17c9ee4b002d5c0783381\" >not a secure move<\/a> on its own \u2014 and place your Haven phone on top of it. If someone opens the safe while you\u2019re away, the phone\u2019s light meter might detect a change in lighting, its microphone might hear the safe open (and even the attacker speak), its accelerometer might detect motion if the attacker moves the laptop, and its camera might even capture a snapshot of the attacker\u2019s face. The Haven app will log all of this evidence locally on the Android device.<\/p>\n<div id=\"attachment_103956\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop2.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-103956\" class=\"wp-image-103956\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop2.jpg\" alt=\"\" width=\"400\" height=\"711\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop2.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop2-169x300.jpg 169w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><p id=\"caption-attachment-103956\" class=\"wp-caption-text\">Intrusion events in the Haven app.<\/p><\/div>\n<p>You can configure Haven to send you real-time encrypted alerts of what it detects to your other phone, the one you carry with you, when an intrusion is detected. You can choose to get encrypted <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2017\/05\/01\/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal\/\" >Signal<\/a> notifications, and you can also configure Haven to run a Tor onion service website (that is, a darknet site), and use Tor Browser on another device to connect in and view all of the alerts \u2014 all without giving anyone else access to these evidence logs unless you choose to share them. Haven also supports SMS text notifications, which can be intercepted but which might be more reliable in some situations.<\/p>\n<div id=\"attachment_103957\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop3.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-103957\" class=\"wp-image-103957\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop3.jpg\" alt=\"\" width=\"400\" height=\"711\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop3.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/haven-feautre_art-snowden-app-tech-cellphone-laptop3-169x300.jpg 169w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><p id=\"caption-attachment-103957\" class=\"wp-caption-text\">Real-time encrypted Signal notifications of intrusion events from Haven.<\/p><\/div>\n<p>Protecting my laptop against evil maid attacks is my primary use-case for Haven, but it isn\u2019t the only reason people might be interested in using the app.\u201dI can imagine this might be useful to victims of domestic abuse who are worried about their abusers spying on them in some way,\u201d Eva Galperin, director of cybersecurity for Electronic Frontier Foundation, said. Galperin is familiar with the security challenges of evil maid attacks, but has not tested out Haven herself. \u201cThis might be useful for teenagers who are concerned about their parents, or who are concerned about nosy partners, or friends [spying on them]. Or if you\u2019re in college and you\u2019re worried about your roommate,\u201d she added.<\/p>\n<p>Galperin\u2019s main concern about Haven is false positives. \u201cIf you\u2019re concerned about people coming into the room and moving things, it doesn\u2019t necessarily mean that they have ill intent. Or you could be setting things up on a hair trigger, and then you end up with a bunch of false positives and get paranoid for no reason,\u201d she said. \u201cMaybe the maid isn\u2019t evil. Sometimes the maid is just a maid.\u201d<\/p>\n<p>Haven can also be used as a cheap home or office security system to detect break-ins or vandalism while you\u2019re away, positioning the phone to send you photographs when someone walks within range. Or you can use it to monitor for wildlife in rural areas, or to capture evidence of human rights violations and disappearances.<\/p>\n<p>Based on my experience testing Haven so far, here are some of the things to consider.<\/p>\n<p>You definitely need a separate Android device to use Haven effectively, but you don\u2019t actually need to pay for phone service for that device if you don\u2019t want to. Without phone service, here are your options for using Haven:<\/p>\n<ul>\n<li>You could choose to not get notifications on your other phone at all, and instead just check the local Haven logs once you get back to the room you\u2019re monitoring.<\/li>\n<li>You could connect to a wifi network (like the hotel\u2019s network) on your Haven phone, and configure Haven to run a Tor onion service website directly on the phone. You can then use <a target=\"_blank\" href=\"https:\/\/www.torproject.org\/download\/download-easy.html.en\" >Tor Browser<\/a> on a computer, <a target=\"_blank\" href=\"https:\/\/guardianproject.info\/apps\/orfox\/\" >Orfox<\/a> on an Android phone, or <a target=\"_blank\" href=\"https:\/\/itunes.apple.com\/us\/app\/onion-browser\/id519296448?mt=8\" >Onion Browser<\/a> on an iPhone to load this website to check for intrusion alerts. To do this, you need to install the <a target=\"_blank\" href=\"https:\/\/guardianproject.info\/apps\/orbot\/\" >Orbot<\/a> app, which is Tor for Android, on your Haven phone as well.<\/li>\n<li>You could also connect to wifi and configure Haven to send you real-time Signal notifications as intrusion events happen. This is the most user friendly way of getting alerts. However, without phone service, it\u2019s not trivial to set up because you\u2019ll need to obtain an extra phone number to register a new Signal account with, like described in <a target=\"_blank\" href=\"https:\/\/theintercept.com\/2017\/09\/28\/signal-tutorial-second-phone-number\/\" >this article<\/a>.<\/li>\n<\/ul>\n<p>If you do pay for phone service for your Haven phone:<\/p>\n<ul>\n<li>If your phone plan includes mobile data, you don\u2019t have to worry about wifi being available. In fact, I\u2019d recommend disabling wifi and only using mobile data.<\/li>\n<li>You can use the Haven app to register a Signal account using your spare phone\u2019s phone number, to send encrypted notifications to your normal phone via Signal.<\/li>\n<li>You can also choose to have Haven send SMS notifications to your normal phone on intrusion events, instead of using Signal.<\/li>\n<\/ul>\n<p>If you\u2019re going to be gone for a long period of time, you might need to keep your Haven phone plugged in so that it doesn\u2019t run out of battery and power off. This means you can\u2019t keep your laptop and Haven phone in a hotel safe for too long before the battery dies. But, considering hotel safes are not very secure, it\u2019s not too different to just leave your laptop and Haven phone on the desk or bedside table, plugged in.<\/p>\n<p>Another thing to consider is the the security of your Haven phone itself.<\/p>\n<p>A clever attacker who knows that you\u2019re using Haven could jam the wifi, mobile data, and SMS wireless frequencies, preventing Haven from sending you notifications. The attacker could then attempt to access the phone to delete the local evidence logs from the device as well.<\/p>\n<p>For this reason, it\u2019s important to lock down your Haven phone. Lock your phone with a strong passcode or password, and make sure your phone is encrypted. You can change your lockscreen and security settings from the Settings app. Also, install all updates for Android and for all of your apps, and turn off all radios that you aren\u2019t using, like bluetooth and NFC. If you can, use mobile data and turn off wifi as well. This will reduce the attack surface of the phone, making it more difficult for an attacker to hack it once they\u2019ve entered your room.<\/p>\n<p>Rutkowska said she \u201cabsolutely\u201d believes there is a need for technology like Haven, and suggested that the developers add \u201ca hearbeat signal\u2026 for remote logging.\u201d That would help warn users when the device loses a network connection, for example due to signal jamming. She also thinks most users will disable real-time notifications because \u201cgetting lots of Signal messages is annoying\u201d \u2014 better to have a log that can be consulted later. To protect it from tampering, such a log could be cryptographically signed. It could also be pushed to a remote location, like a git version-control repository running on a distant server.<\/p>\n<p>If an attacker can both jam your Haven phone\u2019s radio signals and also hack into it to delete the evidence of intrusion, it\u2019s possible for them to then still do an evil maid attack on your laptop without getting caught. However, Haven makes such an attack considerably more expensive, with less certainty of success, than if all they had to deal with was tampering with your laptop.<\/p>\n<p>Another thing to keep in mind is that Haven can only monitor for intrusions if you actually use it. During my time testing it, more than once I positioned my Haven phone in the right place, made sure it was connected to wifi so I could get notifications, and plugged in so the battery wouldn\u2019t die, but then forgot to actually activate the app. Several hours later when I returned to my room and found the Haven phone deactivated, I had no way of knowing if an intrusion occurred or not.<\/p>\n<p>Finally, Haven is still in early development. There are still kinks that need to be worked out, plenty of bugs that need to be fixed, and plenty of features that would make it more useful and more reliable. There are false positives; once, I came back to find over 80 intrusion alerts, all of them the sounds of loud cars or sirens driving by my Manhattan hotel room. And sometimes, actual events don\u2019t get logged when they should \u2014 I ran into issues where camera motion events weren\u2019t getting triggered at all on my device, but that bug has been resolved for me now. It would be prudent to wait for the Haven app to mature before relying on it in high security situations.<\/p>\n<p>But even now, it\u2019s much better than leaving your laptop exposed to physical attacks without any monitoring while you\u2019re heading out for drinks after a long day at a conference.<\/p>\n<p>________________________________________________<\/p>\n<p><em>Related: <\/em><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2015\/04\/27\/encrypting-laptop-like-mean\/\" >Encrypting Your Laptop Like You Mean It<\/a><\/strong><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/Micah-Lee-1485659935.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-103958 size-full\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/12\/Micah-Lee-1485659935-e1514198246811.jpg\" alt=\"\" width=\"100\" height=\"100\" \/><\/a><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/micah-lee\/\" >Micah Lee<\/a> &#8211; <a href=\"mailto:micah.lee@theintercept.com\">micah.lee@\u200btheintercept.com<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2017\/12\/22\/snowdens-new-app-uses-your-smartphone-to-physically-guard-your-laptop\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>22 Dec 2017 &#8211; Edward Snowden and a team of collaborators have been working on a new open source Android app called Haven that you install on a spare smartphone, turning the device into a sort of sentry to watch over your laptop.  &#8220;Haven&#8221; guards against so-called evil maid attacks, in which your boot software is surreptitiously modified to defeat encryption.<\/p>\n","protected":false},"author":4,"featured_media":103955,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[],"class_list":["post-103954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/103954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=103954"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/103954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/103955"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=103954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=103954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=103954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}