I've created a new sample app for IOCipher that demonstrates how to capture, view and share photos and video in as secure a manner as possible. All media is captured directly from the camera sensor in memory as byte[] or streamed via ParcelFileDescriptor pipe (thanks Mark/CommonsGuy!) in the case of the video camera recording. There are two viewer activities as well for displaying photos or videos directly from IOCipher, with photos just reading byte[] directly, and video playback done via a mini-one-time localhost HTTP server stream. The sample also demonstrates a simple ContentProvider that can be used to share/SEND files to other apps via the same ParcelFileDescriptor pipe trick used to capture video.
https://github.com/n8fr8/IOCipherCameraExample Other than the static/hardcoded demo password, I would appreciate any hole poking people feel up to doing on the approach that has been taken. Are there places where media bytes might be leaking? At one points might other apps intercept packets or pixels from the camera or players? Any features or requirements that this sample code doesn't cover but should? Thanks for any time you have. +n _______________________________________________ Guardian-dev mailing list Post: [email protected] List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To Unsubscribe Send email to: [email protected] Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com You are subscribed as: [email protected]
