[APP][2.2+] The best solution for data protection, Mobile StrongBOX FREE - Android Apps and Games

Hello to ALL!
After almost 2 years since the first Symbian release, I have ported my application,Mobile StrongBOX, to Android (finaly ).
It is available on Google Play, but since I'm new on this forum I ca not post the link to it. The best way to find it is to search for "strongbox" in Google Play.
Mobile StrongBOX is designed for the secure storage of private information, such as photos or videos, passwords, data for bank accounts, documents and anything else you want to protect. The application uses a strong public-key crypto-system that is optimized for mobile phones.
Today we take our phones everywhere we go and we can have our private data with us. Take, for example, private photos: we all have them on our phones, but in case we lose our phone we are in trouble because someone else can view our private photos! The same problem is for any private data that we store on our devices like passwords, bank account information, private documents etc. Mobile StrongBOX is designed to solve this problem, it offers protection so we do not fear any more to take our private data with us.
Encryption is the best type of data protection. There are many solutions that in case of stolen phone allow you to wipe the data on the device, BUT from the point when you lose your phone until you realize that, it can be too late!
Mobile StrongBOX uses strong 256-bit AES (Advanced Encryption Standard) encryption for data and 1024-bit RSA encryption for keys. Any kind of information can be secured with Mobile StrongBOX. It does protect your data, but also helps you if you have many things to memorize like passwords and credit card PINs. With Mobile StrongBOX you will not have to worry about these things any more!
Storing passwords, PINs, credit card numbers, membership info, login credentials etc. is now very easy and safe. Photos, videos, documents and folders can also be added to strongbox, keeping the hierarchical structure of folders (for example you can encrypt your private photos and videos so no one else can view them).
Key features and advantages over similar apps:
- very strong encryption: 256 AES + 1024 RSA
- not only encrypts items like passwords but files like private documents and photos/videos, too.
- every file or item is encrypted with different a AES key, automatically generated.
- customizable templates: add/remove/rename fields, you can change icons, add your own templates.
- multiple files or folders import(encrypt) / export(decrypt) in one operation.
- you can create sub-folders and group files/items however you like.
- no export needed to view files, view them directly from the app.
- secure erasing of imported files, if you want to.
- search, auto-lock, trash
- you can have multiple strongboxes and switch between them.
- does not contain ads, does not have INTERNET permission
With Mobile StrongBOX you have your private information encrypted in your pocket anywhere, ON-THE-GO.

Related

SECURITY: passwords storing

I would be really pleased if someone could give me a technical description (a cryptographic one) about how ANDROID stores the user´s private passwords. I mean, how are they are encrypted (if it does)? ¿using what algorithms and keys?
The reason is easy to understand. A normal user gives it´s phone 2 types of passwords that should be protected:
1.- One, is the Google´s main password used by the phone to sync (GMail, Calendar, etc)
2.- The second are the passwords that have been marked in the ANDROID´s browser as: "remembered"
Isn´t hard to imagine a situation in what you phone becames lost and it arrives at hands of someone that (before formatting it) wants to take advantadge or obtain all the phone´s stored passwords.
In fact, reading the internal file system or the SD one, must be almost trivial, and from there obtaining the passwords. ¿How does ANDROID protects the user against it?

How To Remember Passwords for All Websites?

Some websites call a function to disable autocomplete, and so the Android browser doesn't save passwords for these websites. I would like to bypass this limitation. Any idea?
Cookie points: Some way to manage/view saved passwords individually. Simply being able to clear all saved passwords isn't cutting it.

WSJ: Apps Go Too Far In Sharing Your Info To Third Parties

A list of popular Phone spyware. http://blogs.wsj.com/wtk-mobile/
boogieTilt said:
A list of popular Phone spyware. http://blogs.wsj.com/wtk-mobile/
Click to expand...
Click to collapse
(Bump)
CategoryUtility
PlatformAndroid
Author / PublisherZedge
TypeFree
Has a privacy policy?Yes, in the app and on the website.
The Journal tested 101 popular smartphone apps to see what data about the phones, their users, and their locations they gathered and revealed to others. The Journal also reviewed what information the app tells users it will collect, and whether it has a privacy policy. Here is a summary of those findings.
Explicitly Asks Permission to Access
Read Contact Data (access data in your address book)
Read Internet's history and bookmarks (Web browsing information)
Full internet access (Can send data out about you)
Read phone state and identity (access unique IDs on your phone)
Read system log files (access to files on how you use the phone and apps)
Coarse (network-based) location (based on Wi-Fi and cell phone towers)
Fine (GPS) location (based on global positioning system)
Sends to Third Parties
Phone ID
Zedge says the application requests to read and write contact data in order to set contact ringtones, and that it does not store this information.
« Previous
YouTube (Android)

[App 04 26,2011] UniQPass - Safe Wallet & Data Vault

LiniQue has just launched its first secure ewallet and data vault. We would like to know how you think about it. Please follow thread to reply to win the 10 units of free UniQPass Pro version. Your comments/suggestions are more than welcome~~
UniQPass Lite with full features is now available for FREE! Optimized for Android; supporting Android OS 2.0 and above.
UniQPass is more than a password manager! It allows you to record and manage all your confidential account information and personal data such as credit cards and internet banking details, login information for favorite email and chat accounts, insurance policies and club memberships in an effortless and fun way!
Keep your credit cards, passwords, and other personal information at your fingertips. UniQPass protects your digital life in an easy and secure way with powerful 256-bit AES encryption. The Auto-Sync feature enables you to access your updated data on all your devices right away. Even when you reset your device, you don’t need to retype your data. Your files will be automatically restored! With Instant capture, you can save the hassle of tedious typing and just capture a picture of your cards. UniQPass is your ideal personal wallet! Carry all your card data, minus the weight!
KEY FEATURES:
* Ultra secure: 256-bit AES encryption technology to protect your data in the local device, cloud server and even during the data transmission.
* Store Important Information: stores and protects your credit card or membership details from any unauthorized access, keeping your information secret and safe.
* Auto-Sync and backup: Just logon to your account and you will instantly get access to all the data you need on your devices. Even when you reset the device, UniQPass will automatically restore your data for you. It allows you to synchronize your data with a cloud server so you can access them anywhere, anytime, on any device, via Wi-Fi, 3G or GPRS
* Instant Capture: UniQPass allows you to capture and store images of your cards into the photo library so you can always use it as an image associated with your card!
* Pre-defined Templates: UniQPass lets you choose from 14 different themes and folder types to make your E-wallet more interesting, fun and personal.
* Flexible Organizer: UniQPass allows you to create and rename your own category according to your individual preferences.
* Multi- Device Support: UniQPass can be installed on your Tablet, Smartphone, iPad.
==========================================
*** Upgrade to UniQPass Pro ***
The Lite version is limited to 10 card records and allows you to experience the sync feature for 7 days.
If you love it, get the UniQPass Pro version to fully enjoy this organizing tool without any limitation.
------UniQPass Pro only $4.99 now to celebrate the worldwide launch of UniQPass!------
Is this safe? Storing your passwords and sensitive data on their servers.

SplashID v7 upgrade security issue

Besides the issues SplashData has with their SplashID v7 android upgrade losing many customers data, there is also a very worrying security issue which splashdata ignores = and actively censors, my messages regarding this on their FB page have been deleted and I am blocked from commenting our writing there)
Here is the issue:
The new SplashID version 7 had a cloud sync feature (30 day free trial, then for a fee). When first starting the upgraded version (which may have been installed automatically on Android if one allows auto upgrades!), one first has to again enter one's email address/username, and then the password (which is the one used to encrypt one's database containing all one's private, sensitive data!). Then the upgrade asks whether one wants to try the cloud sync feature.
Even if one declines and opts to stay with the existing Wi-Fi sync feature only(which does not need a cloud account), the upgrade goes ahead and automatically creates such a cloud account on splashdata's servers.*and it uses the same password* for this. (In fact as further part of the upgrade procedure one needs to log into those cloud servers using that password after receiving an activation link in email.
So, splashdata leaks the master password which one uses to secure one's most private data (credit card pins, login password etc) into their cloud, without telling that this will be fine, not asking permission.
There is no info whether the password is stored securely (doubt it), whether it is in ask cases transmitted securely (doubt that too) and anyhow, once this has happened one had lost control over that most important password. It's burnt.in the wild, out of one's own control
Note that changing the password on one's own copy of SplashID us a good idea after that, but any old copy of one's encrypted database that might still live on any old disk backup, cloud service (dropbox etc) or SD card somewhere, us now vulnerable.
And because splashdata in their 'wisdom' associated one's email address (and thus identity) with that password, it's easier for hackers to fund it.better companies than splashdata have lost password in the past.
It is even a very bad idea to user the same password for s cloud service as one uses for securing one's private data. Forcing this into users without permission or warning is almost criminal.
Sent from my GT-N7000 using Tapatalk 2
sejtam said:
Besides the issues SplashData has with their SplashID v7 android upgrade losing many customers data, there is also a very worrying security issue which splashdata ignores = and actively censors, my messages regarding this on their FB page have been deleted and I am blocked from commenting our writing there)
Here is the issue:
The new SplashID version 7 had a cloud sync feature (30 day free trial, then for a fee). When first starting the upgraded version (which may have been installed automatically on Android if one allows auto upgrades!), one first has to again enter one's email address/username, and then the password (which is the one used to encrypt one's database containing all one's private, sensitive data!). Then the upgrade asks whether one wants to try the cloud sync feature.
Even if one declines and opts to stay with the existing Wi-Fi sync feature only(which does not need a cloud account), the upgrade goes ahead and automatically creates such a cloud account on splashdata's servers.*and it uses the same password* for this. (In fact as further part of the upgrade procedure one needs to log into those cloud servers using that password after receiving an activation link in email.
So, splashdata leaks the master password which one uses to secure one's most private data (credit card pins, login password etc) into their cloud, without telling that this will be fine, not asking permission.
There is no info whether the password is stored securely (doubt it), whether it is in ask cases transmitted securely (doubt that too) and anyhow, once this has happened one had lost control over that most important password. It's burnt.in the wild, out of one's own control
Note that changing the password on one's own copy of SplashID us a good idea after that, but any old copy of one's encrypted database that might still live on any old disk backup, cloud service (dropbox etc) or SD card somewhere, us now vulnerable.
And because splashdata in their 'wisdom' associated one's email address (and thus identity) with that password, it's easier for hackers to fund it.better companies than splashdata have lost password in the past.
It is even a very bad idea to user the same password for s cloud service as one uses for securing one's private data. Forcing this into users without permission or warning is almost criminal.
Sent from my GT-N7000 using Tapatalk 2
Click to expand...
Click to collapse
Ouch, that sounds a bad idea. If the user doesn't want a remote account made, they should respect that. Can you give me any more details about this, I would like to contact them and request some proper response to this. While they might not be leaking the plaintext password, anything that can be "opened" with your password is a significant enough leak, as it would allow an attacker to verify they have the right password.
pulser_g2 said:
Ouch, that sounds a bad idea. If the user doesn't want a remote account made, they should respect that. Can you give me any more details about this, I would like to contact them and request some proper response to this. While they might not be leaking the plaintext password, anything that can be "opened" with your password is a significant enough leak, as it would allow an attacker to verify they have the right password.
Click to expand...
Click to collapse
Not much more that I already said. I am a long-time user of their SplashID (Mac) Desktop and Android app to store all my credit card, bank acount and yes, many systems passwords in.
The database they use is encrypted with a 'master password' which one has to enter on ones' Android (or iPhone, etc) or Desktop everytime to
unlock and decrypt (in memory), so that one access the data.
The same password is used on both the mobile and desktop of course.
A few days ago, an upgrade to SplashID v7 was made available on the Google Play store. I don't allow 'automatic' updates (though I am sure a lot of folks do!), but this time I also did not really check what the upgrade offered, and clicked 'UPDGRADE ALL' when it was offered along with a nunber of other upgrades. So it got installed.
When i subsequently opened SplashID again, it told me about all the shiny new features (cloud sync etc) and as normal asked me for my password (it also asked for my email address. I though that this was for them to check my purchase/license ans what features woudl be enabled)..
I thought that it would then show me my data. But wrong. Instead it offered me a selection whether I want to use the new 'cloud sync' feature (30 day free trial, later for $$), or stay with the normal 'wifi sync'.
I opeted for the latter (because I don't trust having my data sent to the cloud).
Anyway, the next thing I get is a message: (paraphrasing) "we have created your cloud account, you will get an email and will have to verify your email). Sure enough, I get an email:
Thank you for signing up for SplashID Safe Personal Edition!
To activate your account, please verify your email address by clicking the link below: Verify Email
Then check your email for our SplashID Safe Welcome message.{/QUOTE]
The link goes to: https://www.splashid.com/personal/webclient/login.php
I had to again ther enter my email address, and *the same password* that I entered before (which I thought would be for my private data-store).
Yes, that same password was used to create my account on their cloud server, even though I opted for the Wifi Sync *only* and never
asked for a cloud-sync.
Nor did the app tell me that the same password would be used to secure that aco****.
The issues with this are self-evident:
a) my most secure password, the one used to secure my data on my mobile and on my desktop is now 'leaked' to their cloud account
b) I have *no* idea how secuerly that password was transferred (in clear, encrypted, just a hash), nor how securely it is stored
c) it clearly is linked to my cloud-account on their website, so
- someone somehow learning that password could 'verify' it by accessing that account
- if someone hacked their system and accessed their database, that link would be apparent to them
d) I have nost *all control* over securing that password myself. It is 'burnt', 'in the wild'
e) Any pass backups of my secure SplashID database that may live on SD cards of mine, on backup disks, which may have
been copied to the cloud (dropbox, others) are now vulnerable. It is no use for me to change this password here now, as
old copies that may still exist somewhere are still encrypted with this password (and I cannot change them back).
Yes, I am trying to limit exposure for that password data file as much as possible, but eg Titatium Backup may have at some point in teh past backed it up and copied a backup to the cloud (yes, that is also encrypted, but once that featire failed).
More that that, of course users who are not as security conscious may have opeted for 'could sync'.
While I have not tried this feature myself, it sounds to me like thsi does copy the teh data to SplashID's cloud and
there secures it too only with that one single password.
So many users wh may not have thought all this out may have opted for the 'CloudSync' trial, and not only have their
password 'leaked'/'burnt' now, but also have all their data in the cloud, again secured only with a password that is no longer in their sole possession.
In fact, any secure, trustworthy system would have
a) been *very* upfront about what they are going to do with the password and the cloud account
b) used a separate password to secure the cloud account
c) only stored my encrypted copy of the database in their cloud, without *them* having the password for it
d) done any syncing on the client (ie, transfer the complerte encrypted password to the mobile or desktop where the comparisonupdates would happen) and then copied back again a secured file, that was encrypted on the mobile).
Click to expand...
Click to collapse
More discussion on SplashID's own site: http://forum.splashdata.com/showthr...ically-send-in-background-to-splash-id-server

Categories

Resources