I am pretty sure we considered Conceal around the time of the v0.1 IOCipher release. If I remember correctly, it encrypts, per-file, so it leaks a lot of metadata.
As for a minimal openssl build, that would be quite nice to have. That seems to be the kind of thing that you need lots of money to spend on a build engineer in order to achieve. .hc Nathan of Guardian wrote: > > Seems like we might learn some things about minimizing OpenSSL from the > project below. Also, just another interesting tool. > > ----- Original message ----- > From: Richard Newman <[email protected]> > To: "mobile-firefox-dev" <[email protected]> > Subject: Conceal: efficient storage encryption for Android > Date: Tue, 21 Oct 2014 10:19:47 -0700 > > Came across this today. > > https://code.facebook.com/posts/1419122541659395/introducing-conceal-efficient-storage-encryption-for-android/ > > http://facebook.github.io/conceal/ > > I find it interesting that — as we almost did at one point — they’ve > chopped down OpenSSL to 85KB, wrapped it in Java, and ended up with an > efficient storage interface for encrypted data. > > This might finally put us in a place where we’re OK keeping profiles on > an SD card. We might also consider using this for secure backup/restore > of profile data. > > BSD licensed. > _______________________________________________ > mobile-firefox-dev mailing list > [email protected] > https://mail.mozilla.org/listinfo/mobile-firefox-dev > > -- PGP fingerprint: 5E61 C878 0F86 295C E17D 8677 9F0F E587 374B BE81 _______________________________________________ Guardian-dev mailing list Post: [email protected] List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To Unsubscribe Send email to: [email protected] Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com You are subscribed as: [email protected]
