I've created a new sample app for IOCipher that demonstrates how to
capture, view and share photos and video in as secure a manner as
possible. All media is captured directly from the camera sensor in
memory as byte[] or streamed via ParcelFileDescriptor pipe (thanks
Mark/CommonsGuy!) in the case of the video camera recording. There are
two viewer activities as well for displaying photos or videos directly
from IOCipher, with photos just reading byte[] directly, and video
playback done via a mini-one-time localhost HTTP server stream. The
sample also demonstrates a simple ContentProvider that can be used to
share/SEND files to other apps via the same ParcelFileDescriptor pipe
trick used to capture video.

https://github.com/n8fr8/IOCipherCameraExample

Other than the static/hardcoded demo password, I would appreciate any
hole poking people feel up to doing on the approach that has been taken.
Are there places where media bytes might be leaking? At one points might
other apps intercept packets or pixels from the camera or players? Any
features or requirements that this sample code doesn't cover but should?

Thanks for any time you have.

+n


_______________________________________________
Guardian-dev mailing list

Post: [email protected]
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev

To Unsubscribe
        Send email to:  [email protected]
        Or visit: 
https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com

You are subscribed as: [email protected]

Reply via email to