convert all Guardian Project metadata files to YAML

This commit is contained in:
Hans-Christoph Steiner 2018-12-13 19:41:46 +01:00
parent 89ed7e09c5
commit aa933ae3df
No known key found for this signature in database
GPG key ID: 3E177817BA1B9BFA
26 changed files with 951 additions and 818 deletions

View file

@ -1,63 +0,0 @@
Categories:Internet,Security
License:GPL-2.0-only
Web Site:https://guardianproject.info/apps/orweb
Source Code:https://github.com/guardianproject/orweb
Issue Tracker:https://dev.guardianproject.info/projects/orweb/issues?set_filter=1
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Orweb
Summary:Privacy-enhanced browser
Description:
Orweb is a companion browser to [[org.torproject.android]], the port of Tor to
Android.
Orbot anonymizes internet traffic by routing it through many different stages
and you must have that enabled first, though root isn't needed. Orweb disables
certain other browser features that could be used to identify you.
Please note that Orweb is superseded by [[info.guardianproject.orfox]],
available from the [https://guardianproject.info/fdroid/repo/ Guardian Project
repo]. Orweb is no longer maintained at all.
.
Repo Type:git
Repo:https://github.com/guardianproject/Orweb.git
Build:0.2.2,3
commit=460a5a92bc5a426f7ff710f03bc1341359a17d4b
Build:0.4.2,15
commit=3cab65406614bb43ce65133cda731f80939b3b5c
Build:0.4.4,18
commit=0.4.4
srclibs=ActionBarSherlock@6e3f2bb5
prebuild=sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@' project.properties
Build:0.5.1,24
commit=0.5.1
submodules=yes
prebuild=cp libs/android-support-v4.jar external/ActionBarSherlock/actionbarsherlock/libs/android-support-v4.jar
Build:0.6,26
commit=0.6
submodules=yes
prebuild=cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
Build:0.6.1,27
commit=0.6.1
submodules=yes
prebuild=cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
Build:0.7.1,7010
commit=0.7.1
submodules=yes
prebuild=cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
scanignore=external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
Archive Policy:0 versions
Auto Update Mode:None
Update Check Mode:Tags
Current Version:0.7.1
Current Version Code:7010

View file

@ -0,0 +1,75 @@
Categories:
- Internet
- Security
License: GPL-2.0-only
WebSite: https://guardianproject.info/apps/orweb
SourceCode: https://github.com/guardianproject/orweb
IssueTracker: https://dev.guardianproject.info/projects/orweb/issues?set_filter=1
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Orweb
Summary: Privacy-enhanced browser
Description: |-
Orweb is a companion browser to [[org.torproject.android]], the port of Tor to
Android.
Orbot anonymizes internet traffic by routing it through many different stages
and you must have that enabled first, though root isn't needed. Orweb disables
certain other browser features that could be used to identify you.
Please note that Orweb is superseded by [[info.guardianproject.orfox]],
available from the [https://guardianproject.info/fdroid/repo/ Guardian Project
repo]. Orweb is no longer maintained at all.
RepoType: git
Repo: https://github.com/guardianproject/Orweb.git
Builds:
- versionName: 0.2.2
versionCode: 3
commit: 460a5a92bc5a426f7ff710f03bc1341359a17d4b
- versionName: 0.4.2
versionCode: 15
commit: 3cab65406614bb43ce65133cda731f80939b3b5c
- versionName: 0.4.4
versionCode: 18
commit: 0.4.4
srclibs:
- ActionBarSherlock@6e3f2bb5
prebuild: sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@'
project.properties
- versionName: 0.5.1
versionCode: 24
commit: 0.5.1
submodules: true
prebuild: cp libs/android-support-v4.jar external/ActionBarSherlock/actionbarsherlock/libs/android-support-v4.jar
- versionName: '0.6'
versionCode: 26
commit: '0.6'
submodules: true
prebuild: cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
- versionName: 0.6.1
versionCode: 27
commit: 0.6.1
submodules: true
prebuild: cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
- versionName: 0.7.1
versionCode: 7010
commit: 0.7.1
submodules: true
prebuild: cp libs/android-support-v4.jar external/netcipher/libnetcipher/libs/android-support-v4.jar
scanignore:
- external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
ArchivePolicy: 0 versions
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: 0.7.1
CurrentVersionCode: 7010

View file

@ -1,57 +0,0 @@
Categories:Security
License:GPL-3.0-only
Web Site:https://guardianproject.info/2011/09/05/cacertman-app-to-address-diginotar-other-bad-cas
Source Code:https://github.com/guardianproject/cacert
Issue Tracker:https://github.com/guardianproject/cacert/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:CACertMan
Summary:Disable untrusted certificates
Description:
Android 4+ allows you to disable certificates from the system Settings and root
isn't required, so try that first if you want to manually mess with the
certificates. The app won't work with Android 4+ anyway.
An app to manage security certificates on your phone also containing a version
of the Android CACert keystore derived from Mozilla. If a certificate has
recently become untrusted you can either install an update to this app or you
can backup and remove certificates by yourself.
Requires root: Yes, it writes to the system partition. You will need a device
that has the grep command on it (via busybox: present on most custom ROMs). If
the save doesnt work, then you will need to make your /system partition
read-write by using a file explorer like [[com.ghostsq.commander]] or via a
command in [[jackpal.androidterm]].
.
Requires Root:yes
Repo Type:git
Repo:https://github.com/guardianproject/cacert.git
Build:0.0.2-20110906,3
commit=0.0.2
subdir=app
target=android-8
Build:0.0.2.20111012,4
commit=212187e9c398e46fda87fe2335ee48bb693caca0
subdir=app
target=android-8
Build:0.1,5
disable=not a release at 6d819d26d
commit=6d819d26d
subdir=app
submodules=yes
target=android-10
build=cd .. && \
gpg --import ca-certificates-maintainer-Michael-Shuler.pub.asc && \
make && \
mv stores/debiancacerts.bks app/res/raw/cacerts.bks
Auto Update Mode:None
Update Check Mode:Tags
Current Version:0.0.2-20110906
Current Version Code:3

View file

@ -0,0 +1,62 @@
Categories:
- Security
License: GPL-3.0-only
WebSite: https://guardianproject.info/2011/09/05/cacertman-app-to-address-diginotar-other-bad-cas
SourceCode: https://github.com/guardianproject/cacert
IssueTracker: https://github.com/guardianproject/cacert/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: CACertMan
Summary: Disable untrusted certificates
Description: |-
Android 4+ allows you to disable certificates from the system Settings and root
isn't required, so try that first if you want to manually mess with the
certificates. The app won't work with Android 4+ anyway.
An app to manage security certificates on your phone also containing a version
of the Android CACert keystore derived from Mozilla. If a certificate has
recently become untrusted you can either install an update to this app or you
can backup and remove certificates by yourself.
Requires root: Yes, it writes to the system partition. You will need a device
that has the grep command on it (via busybox: present on most custom ROMs). If
the save doesnt work, then you will need to make your /system partition
read-write by using a file explorer like [[com.ghostsq.commander]] or via a
command in [[jackpal.androidterm]].
RequiresRoot: 'yes'
RepoType: git
Repo: https://github.com/guardianproject/cacert.git
Builds:
- versionName: 0.0.2-20110906
versionCode: 3
commit: 0.0.2
subdir: app
target: android-8
- versionName: 0.0.2.20111012
versionCode: 4
commit: 212187e9c398e46fda87fe2335ee48bb693caca0
subdir: app
target: android-8
- versionName: '0.1'
versionCode: 5
disable: not a release at 6d819d26d
commit: 6d819d26d
subdir: app
submodules: true
target: android-10
build:
- cd ..
- gpg --import ca-certificates-maintainer-Michael-Shuler.pub.asc
- make
- mv stores/debiancacerts.bks app/res/raw/cacerts.bks
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: 0.0.2-20110906
CurrentVersionCode: 3

View file

@ -1,38 +0,0 @@
Categories:Development
License:GPL-3.0-only
Web Site:https://dev.guardianproject.info/projects/checkey
Source Code:https://gitlab.com/guardianproject/checkey
Issue Tracker:https://gitlab.com/guardianproject/checkey/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Checkey
Summary:Info on local apps
Description:
Checkey is a utility for getting information about the APKs that are installed
on your device. Starting with a list of all of the apps that you have installed
on your device, it will show you the APK signature with a single touch, and
provides links to virustotal.com and androidobservatory.org to easily access the
profiles of that APK. It will also let you export the signing certificate and
generate ApkSignaturePin pin files for use with the TrustedIntents library.
.
Repo Type:git
Repo:https://gitlab.com/guardianproject/checkey.git
Binaries:https://guardianproject.info/releases/Checkey-%v.apk
Build:0.1.1,101
commit=0.1.1
Build:0.1.2,102
disable=does not verify, META-INF/BUILD.MF is different
commit=0.1.2
Build:0.1.3,103
disable=build output is not a valid apk file
commit=0.1.3
Auto Update Mode:Version %v
Update Check Mode:Tags
Current Version:0.1.3
Current Version Code:103

View file

@ -0,0 +1,42 @@
Categories:
- Development
License: GPL-3.0-only
WebSite: https://dev.guardianproject.info/projects/checkey
SourceCode: https://gitlab.com/guardianproject/checkey
IssueTracker: https://gitlab.com/guardianproject/checkey/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Checkey
Summary: Info on local apps
Description: |-
Checkey is a utility for getting information about the APKs that are installed
on your device. Starting with a list of all of the apps that you have installed
on your device, it will show you the APK signature with a single touch, and
provides links to virustotal.com and androidobservatory.org to easily access the
profiles of that APK. It will also let you export the signing certificate and
generate ApkSignaturePin pin files for use with the TrustedIntents library.
RepoType: git
Repo: https://gitlab.com/guardianproject/checkey.git
Binaries: https://guardianproject.info/releases/Checkey-%v.apk
Builds:
- versionName: 0.1.1
versionCode: 101
commit: 0.1.1
- versionName: 0.1.2
versionCode: 102
disable: does not verify, META-INF/BUILD.MF is different
commit: 0.1.2
- versionName: 0.1.3
versionCode: 103
disable: build output is not a valid apk file
commit: 0.1.3
AutoUpdateMode: Version %v
UpdateCheckMode: Tags
CurrentVersion: 0.1.3
CurrentVersionCode: 103

View file

@ -1,27 +0,0 @@
Categories:Reading
License:GPL-3.0-only
Web Site:https://dev.guardianproject.info/projects/secure-reader
Source Code:https://github.com/guardianproject/securereader
Issue Tracker:
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Courier
Summary:Privacy-aware RSS feed reader
Description:
A feed aggregator/reader focusing on privacy. It supports RSS and ATOM feeds.
.
Repo Type:git
Repo:https://github.com/guardianproject/securereader
Build:0.1.9,15
disable=native libraries/binaries and jars inside submodules
commit=v0.1.9
subdir=app
submodules=yes
Auto Update Mode:None
Update Check Mode:Tags
Current Version:0.1.9
Current Version Code:15

View file

@ -0,0 +1,28 @@
Categories:
- Reading
License: GPL-3.0-only
WebSite: https://dev.guardianproject.info/projects/secure-reader
SourceCode: https://github.com/guardianproject/securereader
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Courier
Summary: Privacy-aware RSS feed reader
Description: A feed aggregator/reader focusing on privacy. It supports RSS and ATOM
feeds.
RepoType: git
Repo: https://github.com/guardianproject/securereader
Builds:
- versionName: 0.1.9
versionCode: 15
disable: native libraries/binaries and jars inside submodules
commit: v0.1.9
subdir: app
submodules: true
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: 0.1.9
CurrentVersionCode: 15

View file

@ -1,59 +0,0 @@
Categories:Connectivity
License:GPL-3.0-only
Web Site:
Source Code:https://github.com/n8fr8/gilgamesh
Issue Tracker:https://github.com/n8fr8/gilgamesh/issues
Changelog:https://github.com/n8fr8/gilgamesh/blob/HEAD/CHANGELOG
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Gilga
Summary:Local chat via Bluetooth
Description:
Use Bluetooth to chat with others in the same area, even if Internet access is
down or restricted.
.
Repo Type:git
Repo:https://github.com/n8fr8/gilgamesh/
Build:1.0,1
commit=eaa1c0dd3e94c6d5da8a67b76ce5cc8fc780c225
subdir=app
Build:0.0.2,2
commit=7fae42a4f12d92c7c82a2145e60f9aa4d413cac4
subdir=app
Build:0.0.4,4
commit=0.0.4
subdir=app
Build:0.0.5,5
commit=0.0.5
subdir=app
Build:0.0.6,6
commit=0.0.6
subdir=app
Build:0.0.7,7
commit=0.0.7
subdir=app
Build:0.0.9,9
commit=0.0.9
subdir=app
Build:0.0.11,11
commit=0.0.11
subdir=app
Build:0.0.12,12
commit=0.0.12
subdir=app
Auto Update Mode:Version %v
Update Check Mode:Tags
Current Version:0.0.12
Current Version Code:12

View file

@ -0,0 +1,68 @@
Categories:
- Connectivity
License: GPL-3.0-only
SourceCode: https://github.com/n8fr8/gilgamesh
IssueTracker: https://github.com/n8fr8/gilgamesh/issues
Changelog: https://github.com/n8fr8/gilgamesh/blob/HEAD/CHANGELOG
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Gilga
Summary: Local chat via Bluetooth
Description: |-
Use Bluetooth to chat with others in the same area, even if Internet access is
down or restricted.
RepoType: git
Repo: https://github.com/n8fr8/gilgamesh/
Builds:
- versionName: '1.0'
versionCode: 1
commit: eaa1c0dd3e94c6d5da8a67b76ce5cc8fc780c225
subdir: app
- versionName: 0.0.2
versionCode: 2
commit: 7fae42a4f12d92c7c82a2145e60f9aa4d413cac4
subdir: app
- versionName: 0.0.4
versionCode: 4
commit: 0.0.4
subdir: app
- versionName: 0.0.5
versionCode: 5
commit: 0.0.5
subdir: app
- versionName: 0.0.6
versionCode: 6
commit: 0.0.6
subdir: app
- versionName: 0.0.7
versionCode: 7
commit: 0.0.7
subdir: app
- versionName: 0.0.9
versionCode: 9
commit: 0.0.9
subdir: app
- versionName: 0.0.11
versionCode: 11
commit: 0.0.11
subdir: app
- versionName: 0.0.12
versionCode: 12
commit: 0.0.12
subdir: app
AutoUpdateMode: Version %v
UpdateCheckMode: Tags
CurrentVersion: 0.0.12
CurrentVersionCode: 12

View file

@ -1,65 +0,0 @@
Categories:Security
License:GPL-3.0-only
Web Site:https://guardianproject.info/code/gnupg
Source Code:https://github.com/guardianproject/gnupg-for-android
Issue Tracker:https://dev.guardianproject.info/projects/gpgandroid/issues
Auto Name:GnuPrivacyGuard
Summary:GnuPG via gpgcli
Description:
GnuPrivacyGuard extends the gpgcli command line tool to bring an integrated
privacy engine to your Android. It gives you command line access to the entire
GnuPG suite of encryption software. It also serves as the test bed for complete
Android integration for all of GnuPG's crypto services, including OpenPGP,
symmetric encryption, and more.
GPG is GNUs tool for end-to-end secure communication and encrypted data
storage. This trusted protocol is the free software alternative to PGP. This app
is built upon GnuPG 2.1, the new modularized version of GnuPG that now supports
S/MIME.
GPG aims to provide an integrated experience, so clicking on PGP files should
"just work". You can also share files to GPG to encrypt them. GPG will also
respond when you click on a PGP fingerprint URL (one that starts with
openpgp4fpr:).
Before using GPG, be sure to launch the app and let it finish its installation
process. Once it has completed, then you're ready to use it. The easiest way to
get started with GPG is to install [[jackpal.androidterm]]. GPG will
automatically configure Android Terminal Emulator as long as you have the "Allow
PATH extensions" settings enabled.
Status: Unmaintained, use [[org.sufficientlysecure.keychain]]
.
Repo Type:git
Repo:https://github.com/guardianproject/gnupg-for-android
Build:0.2.1,3
commit=0.2.1
submodules=yes
prebuild=rm -rf external/gnupg-for-java/
build=make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets && \
make NDK_BASE=$$NDK$$ -C external/
buildjni=yes
Build:0.3.1,5
disable=bison 3.0 errors, should build with 2.5
commit=0.3.1
submodules=yes
prebuild=sed -i 's@\./autogen@AUTOMAKE_SUFFIX=-1.11 ./autogen@g' external/Makefile
build=make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets all
buildjni=yes
Build:0.3.2,3020
disable=take care of binary scanner errors
commit=0.3.2
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets all
buildjni=yes
Archive Policy:0 versions
Auto Update Mode:None
Update Check Mode:Tags
Current Version:0.3.2
Current Version Code:3020

View file

@ -0,0 +1,73 @@
Categories:
- Security
License: GPL-3.0-only
WebSite: https://guardianproject.info/code/gnupg
SourceCode: https://github.com/guardianproject/gnupg-for-android
IssueTracker: https://dev.guardianproject.info/projects/gpgandroid/issues
AutoName: GnuPrivacyGuard
Summary: GnuPG via gpgcli
Description: |-
GnuPrivacyGuard extends the gpgcli command line tool to bring an integrated
privacy engine to your Android. It gives you command line access to the entire
GnuPG suite of encryption software. It also serves as the test bed for complete
Android integration for all of GnuPG's crypto services, including OpenPGP,
symmetric encryption, and more.
GPG is GNUs tool for end-to-end secure communication and encrypted data
storage. This trusted protocol is the free software alternative to PGP. This app
is built upon GnuPG 2.1, the new modularized version of GnuPG that now supports
S/MIME.
GPG aims to provide an integrated experience, so clicking on PGP files should
"just work". You can also share files to GPG to encrypt them. GPG will also
respond when you click on a PGP fingerprint URL (one that starts with
openpgp4fpr:).
Before using GPG, be sure to launch the app and let it finish its installation
process. Once it has completed, then you're ready to use it. The easiest way to
get started with GPG is to install [[jackpal.androidterm]]. GPG will
automatically configure Android Terminal Emulator as long as you have the "Allow
PATH extensions" settings enabled.
Status: Unmaintained, use [[org.sufficientlysecure.keychain]]
RepoType: git
Repo: https://github.com/guardianproject/gnupg-for-android
Builds:
- versionName: 0.2.1
versionCode: 3
commit: 0.2.1
submodules: true
prebuild: rm -rf external/gnupg-for-java/
build:
- make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets
- make NDK_BASE=$$NDK$$ -C external/
buildjni:
- yes
- versionName: 0.3.1
versionCode: 5
disable: bison 3.0 errors, should build with 2.5
commit: 0.3.1
submodules: true
prebuild: sed -i 's@\./autogen@AUTOMAKE_SUFFIX=-1.11 ./autogen@g' external/Makefile
build: make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets all
buildjni:
- yes
- versionName: 0.3.2
versionCode: 3020
disable: take care of binary scanner errors
commit: 0.3.2
submodules: true
build: make NDK_BASE=$$NDK$$ -C external/ distclean clean-assets all
buildjni:
- yes
ArchivePolicy: 0 versions
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: 0.3.2
CurrentVersionCode: 3020

View file

@ -1,136 +0,0 @@
Categories:Development
License:GPL-3.0-only
Web Site:https://github.com/guardianproject/lildebi/wiki
Source Code:https://github.com/guardianproject/lildebi
Issue Tracker:https://github.com/guardianproject/lildebi/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Lil' Debi
Summary:Run Debian on your phone
Description:
Lil' Debi builds up a whole Debian chroot on your phone entirely using
debootstrap. You choose the release, mirror, and size of the disk image, and
away it goes. It could take up to an hour on a slow device.
Then it has a simple chroot manager that fscks your disk, mounts/unmounts
things, starts/stops sshd if you have it installed, etc. You can also then use
apt-get to install any package that is released for ARM processors. This
includes things like a complete real shell, Tor, TraceRouteTCP,
iwconfig/ipconfig, and other security and crypto tools. Works well with
[[jackpal.androidterm]]—just run `/debian/shell` to get a Debian shell.
The aim of Lil Debi is to provide a transparent and tightly integrated Debian
install on your Android device. It mounts all of your Android partitions in
Debian space, so you see a fusion of both systems. It's even possible to have
Lil Debi launch the normal Debian init start-up scripts when it starts, so that
all you need to do is apt-get install and any servers you install will just
work.
Lil' Debi works with as few modifications to the Android system as possible.
Currently, it only adds a /bin symlink, and a /debian mount directory. It does
not touch /system at all.
Requires root: Yes, because it needs to run debootstrap, create dirs in /,
mount/umount, etc.
.
Requires Root:yes
Repo Type:git
Repo:https://github.com/guardianproject/lildebi.git
Build:0.2,3
commit=0.2
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.3,4
commit=0.3
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.1,6
disable=next version just released at 0.4.1
commit=0.4.1
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.2,7
commit=0.4.2
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.3,8
commit=0.4.3
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.4,9
commit=0.4.4
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.5,10
commit=0.4.5
submodules=yes
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.6,11
commit=0.4.6
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.4.7,12
commit=0.4.7
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.5,5000
commit=0.5
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.5.1,5100
commit=0.5.1
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.5.2,5200
commit=0.5.2
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.5.3,5300
commit=0.5.3
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Build:0.5.4,5400
commit=0.5.4
submodules=yes
scanignore=assets/gpgv
build=make NDK_BASE=$$NDK$$ -C external assets
Maintainer Notes:
It should be possible to build gpgv - see See info.guardianproject.gpg README
to build using srclibs=GNUPG
external/data/data/info.guardianproject.gpg/app_opt/bin/gpg2-static :
mv external/data/data/info.guardianproject.gpg/gpgv2-static ../assets/gpgv
Beta: 0.5.x builds are currently beta and there might be other 0.4.x updates.
Use "Archive Policy" to ensure we always have at least one working 0.4 release
ready.
.
Auto Update Mode:Version %v
Update Check Mode:Tags
Current Version:0.5.4
Current Version Code:5400

View file

@ -0,0 +1,157 @@
Categories:
- Development
License: GPL-3.0-only
WebSite: https://github.com/guardianproject/lildebi/wiki
SourceCode: https://github.com/guardianproject/lildebi
IssueTracker: https://github.com/guardianproject/lildebi/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Lil' Debi
Summary: Run Debian on your phone
Description: |-
Lil' Debi builds up a whole Debian chroot on your phone entirely using
debootstrap. You choose the release, mirror, and size of the disk image, and
away it goes. It could take up to an hour on a slow device.
Then it has a simple chroot manager that fscks your disk, mounts/unmounts
things, starts/stops sshd if you have it installed, etc. You can also then use
apt-get to install any package that is released for ARM processors. This
includes things like a complete real shell, Tor, TraceRouteTCP,
iwconfig/ipconfig, and other security and crypto tools. Works well with
[[jackpal.androidterm]]—just run `/debian/shell` to get a Debian shell.
The aim of Lil Debi is to provide a transparent and tightly integrated Debian
install on your Android device. It mounts all of your Android partitions in
Debian space, so you see a fusion of both systems. It's even possible to have
Lil Debi launch the normal Debian init start-up scripts when it starts, so that
all you need to do is apt-get install and any servers you install will just
work.
Lil' Debi works with as few modifications to the Android system as possible.
Currently, it only adds a /bin symlink, and a /debian mount directory. It does
not touch /system at all.
Requires root: Yes, because it needs to run debootstrap, create dirs in /,
mount/umount, etc.
RequiresRoot: 'yes'
RepoType: git
Repo: https://github.com/guardianproject/lildebi.git
Builds:
- versionName: '0.2'
versionCode: 3
commit: '0.2'
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: '0.3'
versionCode: 4
commit: '0.3'
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.1
versionCode: 6
disable: next version just released at 0.4.1
commit: 0.4.1
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.2
versionCode: 7
commit: 0.4.2
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.3
versionCode: 8
commit: 0.4.3
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.4
versionCode: 9
commit: 0.4.4
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.5
versionCode: 10
commit: 0.4.5
submodules: true
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.6
versionCode: 11
commit: 0.4.6
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.4.7
versionCode: 12
commit: 0.4.7
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: '0.5'
versionCode: 5000
commit: '0.5'
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.5.1
versionCode: 5100
commit: 0.5.1
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.5.2
versionCode: 5200
commit: 0.5.2
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.5.3
versionCode: 5300
commit: 0.5.3
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
- versionName: 0.5.4
versionCode: 5400
commit: 0.5.4
submodules: true
scanignore:
- assets/gpgv
build: make NDK_BASE=$$NDK$$ -C external assets
MaintainerNotes: |-
It should be possible to build gpgv - see See info.guardianproject.gpg README
to build using srclibs=GNUPG
external/data/data/info.guardianproject.gpg/app_opt/bin/gpg2-static :
mv external/data/data/info.guardianproject.gpg/gpgv2-static ../assets/gpgv
Beta: 0.5.x builds are currently beta and there might be other 0.4.x updates.
Use "Archive Policy" to ensure we always have at least one working 0.4 release
ready.
AutoUpdateMode: Version %v
UpdateCheckMode: Tags
CurrentVersion: 0.5.4
CurrentVersionCode: 5400

View file

@ -1,53 +0,0 @@
Categories:Navigation,Security
License:GPL-3.0-or-later
Web Site:https://guardianproject.info/2015/01/23/sharing-your-location-privately
Source Code:https://github.com/guardianproject/LocationPrivacy
Issue Tracker:https://dev.guardianproject.info/projects/panic/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:LocationPrivacy
Summary:Filter for various ways of sharing location
Description:
LocationPrivacy is not really app but rather a set of "Intent Filters" for all
of the various ways of sharing location. When you share location from one app,
LocationPrivacy offers itself as an option. It then recognizes insecure methods
of sharing location, and then converts them to more secure methods. This mostly
means that it rewrites URLs to use https, and even to use geo: URIs, which can
work on fully offline setups. LocationPrivacy mostly works by reading the
location information from the URL itself. For many URLs, LocationPrivacy must
actually load some of the webpage in order to get the location.
LocationPrivacy can also serve as a way to redirect all location links to your
favorite mapping app. All map apps in Android can view geo: URIs, and
LocationPrivacy converts many kinds of links to geo: URIs, including: Google
Maps, OpenStreetMap, Amap, Baidu Map, QQ Map, Nokia HERE, Yandex Maps.
.
Repo Type:git
Repo:https://github.com/guardianproject/LocationPrivacy.git
Binaries:https://guardianproject.info/fdroid/repo/LocationPrivacy-0.3.apk
Build:0.1,10
disable=does not verify
commit=0.1
target=android-21
Build:0.2,20
disable=does not verify
commit=0.2
submodules=yes
target=android-22
scanignore=external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
Build:0.3,30
disable=does not verify
commit=0.3
submodules=yes
target=android-22
scanignore=external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
Auto Update Mode:None
Update Check Mode:Tags
Current Version:0.3
Current Version Code:30

View file

@ -0,0 +1,60 @@
Categories:
- Navigation
- Security
License: GPL-3.0-or-later
WebSite: https://guardianproject.info/2015/01/23/sharing-your-location-privately
SourceCode: https://github.com/guardianproject/LocationPrivacy
IssueTracker: https://dev.guardianproject.info/projects/panic/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: LocationPrivacy
Summary: Filter for various ways of sharing location
Description: |-
LocationPrivacy is not really app but rather a set of "Intent Filters" for all
of the various ways of sharing location. When you share location from one app,
LocationPrivacy offers itself as an option. It then recognizes insecure methods
of sharing location, and then converts them to more secure methods. This mostly
means that it rewrites URLs to use https, and even to use geo: URIs, which can
work on fully offline setups. LocationPrivacy mostly works by reading the
location information from the URL itself. For many URLs, LocationPrivacy must
actually load some of the webpage in order to get the location.
LocationPrivacy can also serve as a way to redirect all location links to your
favorite mapping app. All map apps in Android can view geo: URIs, and
LocationPrivacy converts many kinds of links to geo: URIs, including: Google
Maps, OpenStreetMap, Amap, Baidu Map, QQ Map, Nokia HERE, Yandex Maps.
RepoType: git
Repo: https://github.com/guardianproject/LocationPrivacy.git
Binaries: https://guardianproject.info/fdroid/repo/LocationPrivacy-0.3.apk
Builds:
- versionName: '0.1'
versionCode: 10
disable: does not verify
commit: '0.1'
target: android-21
- versionName: '0.2'
versionCode: 20
disable: does not verify
commit: '0.2'
submodules: true
target: android-22
scanignore:
- external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
- versionName: '0.3'
versionCode: 30
disable: does not verify
commit: '0.3'
submodules: true
target: android-22
scanignore:
- external/netcipher/libnetcipher/external/pinning/res/raw/cacerts
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: '0.3'
CurrentVersionCode: 30

View file

@ -1,61 +0,0 @@
Categories:Writing,Security
License:Apache-2.0
Web Site:https://guardianproject.info
Source Code:https://github.com/guardianproject/notecipher
Issue Tracker:https://github.com/guardianproject/notecipher/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:NoteCipher
Summary:Notepad with lock
Description:
Simple app for taking notes that encrypts everything behind a password.
Status: Beta.
.
Repo Type:git
Repo:https://github.com/guardianproject/notecipher.git
Build:0.1,12
commit=8afa912172ce
subdir=app
srclibs=2:ActionBarSherlock@4a79d,3:NumberPicker-SimonVT@b4562,1:Cacheword@d49c128bb,IOCipher@v0.1
prebuild=wget https://s3.amazonaws.com/sqlcipher/SQLCipher+for+Android+v2.2.2.zip && \
rm $$Cacheword$$/libs/iocipher.jar && \
$$SDK$$/tools/android update project -p $$Cacheword$$ -l ../../IOCipher
build=unzip SQLCipher+for+Android+v2.2.2.zip && \
cp -R SQLCipherforAndroidv2.2.2/libs/* libs/ && \
cp -R SQLCipherforAndroidv2.2.2/assets/* assets/ && \
rm libs/guava-r09.jar && \
cp libs/android-support-v4.jar $$Cacheword$$/libs/ && \
cp libs/android-support-v4.jar $$ActionBarSherlock$$/libs/ && \
cp libs/sqlcipher.jar $$Cacheword$$/libs/
Build:0.1,13
disable=not ready for release
commit=ae993855a070df642e6022e4c8431bbb798d544b
subdir=app
submodules=yes
srclibs=SQLCipher@v3.1.0
rm=app/libs/x86/*.so,app/libs/armeabi/*.so
prebuild=sh ../setup-ant.sh && \
cp libs/android-support-v4.jar ../external/actionbarsherlock/actionbarsherlock/libs/android-support-v4.jar && \
cp libs/android-support-v4.jar ../external/cacheword/cachewordlib/libs/android-support-v4.jar && \
pushd $$SQLCipher$$ && \
make init && \
make && \
popd && \
cp -fR $$SQLCipher$$/libs ./ cp -fR $$SQLCipher$$/assets ./
scandelete=external/actionbarsherlock/actionbarsherlock-samples
Maintainer Notes:
* Upstream is not yet ready
* NoteCipher Library has jars
* NoteCipher's submodules include this repo: circular submodules?
.
Auto Update Mode:None
Update Check Mode:RepoManifest
Current Version:0.1
Current Version Code:13

View file

@ -0,0 +1,75 @@
Categories:
- Writing
- Security
License: Apache-2.0
WebSite: https://guardianproject.info
SourceCode: https://github.com/guardianproject/notecipher
IssueTracker: https://github.com/guardianproject/notecipher/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: NoteCipher
Summary: Notepad with lock
Description: |-
Simple app for taking notes that encrypts everything behind a password.
Status: Beta.
RepoType: git
Repo: https://github.com/guardianproject/notecipher.git
Builds:
- versionName: '0.1'
versionCode: 12
commit: 8afa912172ce
subdir: app
srclibs:
- 2:ActionBarSherlock@4a79d
- 3:NumberPicker-SimonVT@b4562
- 1:Cacheword@d49c128bb
- IOCipher@v0.1
prebuild:
- wget https://s3.amazonaws.com/sqlcipher/SQLCipher+for+Android+v2.2.2.zip
- rm $$Cacheword$$/libs/iocipher.jar
- $$SDK$$/tools/android update project -p $$Cacheword$$ -l ../../IOCipher
build:
- unzip SQLCipher+for+Android+v2.2.2.zip
- cp -R SQLCipherforAndroidv2.2.2/libs/* libs/
- cp -R SQLCipherforAndroidv2.2.2/assets/* assets/
- rm libs/guava-r09.jar
- cp libs/android-support-v4.jar $$Cacheword$$/libs/
- cp libs/android-support-v4.jar $$ActionBarSherlock$$/libs/
- cp libs/sqlcipher.jar $$Cacheword$$/libs/
- versionName: '0.1'
versionCode: 13
disable: not ready for release
commit: ae993855a070df642e6022e4c8431bbb798d544b
subdir: app
submodules: true
srclibs:
- SQLCipher@v3.1.0
rm:
- app/libs/x86/*.so
- app/libs/armeabi/*.so
prebuild:
- sh ../setup-ant.sh
- cp libs/android-support-v4.jar ../external/actionbarsherlock/actionbarsherlock/libs/android-support-v4.jar
- cp libs/android-support-v4.jar ../external/cacheword/cachewordlib/libs/android-support-v4.jar
- pushd $$SQLCipher$$
- make init
- make
- popd
- cp -fR $$SQLCipher$$/libs ./ cp -fR $$SQLCipher$$/assets ./
scandelete:
- external/actionbarsherlock/actionbarsherlock-samples
MaintainerNotes: |-
* Upstream is not yet ready
* NoteCipher Library has jars
* NoteCipher's submodules include this repo: circular submodules?
AutoUpdateMode: None
UpdateCheckMode: RepoManifest
CurrentVersion: '0.1'
CurrentVersionCode: 13

View file

@ -1,38 +0,0 @@
Categories:Internet
License:MPL-2.0
Web Site:https://dev.guardianproject.info/projects/orfox-private-browser/
Source Code:https://github.com/guardianproject/Orfox
Issue Tracker:https://dev.guardianproject.info/projects/orfox-private-browser/issues
Donate:https://www.torproject.org/donate/donate.html
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Name:OrFox
Summary:TOR Browser
Description:
This is a new privacy-enhanced browser -- based on Mozilla Firefox, configured
by default to work with Orbot: Tor for Android.
You can learn more about the design of Tor Browser on the
[https://www.torproject.org/projects/torbrowser/design/ TOR website]. Official
TOR Browser source repository, which this app relies on, is at
[https://gitweb.torproject.org/tor-browser.git/].
.
Repo Type:git
Repo:https://github.com/guardianproject/Orfox
Binaries:https://guardianproject.info/fdroid/repo/info.guardianproject.orfox_%c.apk
Build:Fennec-38.1.0esr/TorBrowser-5.0/Orfox-1.0beta1,1
disable=test
commit=c3fd3f811a345e7708a8c26c8105d0991e9f3c69
submodules=yes
output=orfox.apk
build=chmod +x make-release-build && \
./make-release-build
ndk=r8e
Auto Update Mode:None
Update Check Mode:None
Current Version:Fennec-38.1.0esr/TorBrowser-5.0/Orfox-1.0beta1
Current Version Code:1

View file

@ -0,0 +1,41 @@
Categories:
- Internet
License: MPL-2.0
WebSite: https://dev.guardianproject.info/projects/orfox-private-browser/
SourceCode: https://github.com/guardianproject/Orfox
IssueTracker: https://dev.guardianproject.info/projects/orfox-private-browser/issues
Donate: https://www.torproject.org/donate/donate.html
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Name: OrFox
Summary: TOR Browser
Description: |-
This is a new privacy-enhanced browser -- based on Mozilla Firefox, configured
by default to work with Orbot: Tor for Android.
You can learn more about the design of Tor Browser on the
[https://www.torproject.org/projects/torbrowser/design/ TOR website]. Official
TOR Browser source repository, which this app relies on, is at
[https://gitweb.torproject.org/tor-browser.git/].
RepoType: git
Repo: https://github.com/guardianproject/Orfox
Binaries: https://guardianproject.info/fdroid/repo/info.guardianproject.orfox_%c.apk
Builds:
- versionName: Fennec-38.1.0esr/TorBrowser-5.0/Orfox-1.0beta1
versionCode: 1
disable: test
commit: c3fd3f811a345e7708a8c26c8105d0991e9f3c69
submodules: true
output: orfox.apk
build:
- chmod +x make-release-build
- ./make-release-build
ndk: r8e
AutoUpdateMode: None
UpdateCheckMode: None
CurrentVersion: Fennec-38.1.0esr/TorBrowser-5.0/Orfox-1.0beta1
CurrentVersionCode: 1

View file

@ -1,119 +0,0 @@
Categories:Internet
License:Apache-2.0
Web Site:https://dev.guardianproject.info/projects/gibberbot
Source Code:https://github.com/guardianproject/ChatSecureAndroid
Issue Tracker:https://dev.guardianproject.info/projects/gibberbot/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:ChatSecure
Summary:Instant Messaging client with OTR
Description:
The app is currently completly out-of-date. We recommend getting it directly
from the developers using [https://guardianproject.info/fdroid/repo/ their
F-Droid repository]. All existing versions have been moved to our archive.
XMPP (Jabber) client that can do end-to-end encryption using the
[http://en.wikipedia.org/wiki/Off-the-Record_Messaging Off-the-Record Messaging]
protocol and can anonymize your chats via the [[org.torproject.android]] app
(root not required).
The app used to be called GibberBot.
.
Repo Type:git
Repo:https://github.com/guardianproject/ChatSecureAndroid
Build:0.0.7-RC1,25
commit=e17dbbcf338af00466cabc5178634cd0d5ffded8
target=android-4
Build:0.0.8-FINAL,31
commit=e4b49ca9508477564c2cba4cfe2821b270281218
target=android-11
Build:0.0.9-RC3,34
commit=9311f2ebdcf06660fa4f145a1c2d88b6b15341f3
target=android-15
Build:0.0.9-RC4,35
commit=b3a7433be1
target=android-15
Build:0.0.10-RC2,37
commit=v10-RC2
srclibs=ActionBarSherlock@4.1.0
prebuild=sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@' project.properties && \
mkdir assets
Build:0.0.10-RC6,41
commit=0.0.10-RC6
srclibs=ActionBarSherlock@4.1.0
forceversion=yes
forcevercode=yes
prebuild=sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@' project.properties
Build:0.0.11-RC5,57
commit=92db4fe01571
submodules=yes
patch=otr-asmack.patch
prebuild=rm -rf tests/ META-INF/ robo-tests/ gitian/ proguard-project.txt && \
echo "sdk-location=$$SDK$$" > external/asmack/local.properties
update=.,external/ActionBarSherlock/library,external/MemorizingTrustManager,external/OnionKit/library
build=ant -Dbuild.all=true -f external/asmack/build.xml && \
mv external/asmack/build/asmack-android-4.jar libs/
Build:12.4.1,82
disable=prebuilt binaries in source
commit=ee9e3dcc07134
submodules=yes
prebuild=./update-ant-build.sh && \
echo "android.library=true" >> external/MessageBar/library/project.properties && \
echo "sdk-location=$$SDK$$" >> external/asmack/local.properties && \
rm -f external/SlidingMenu/example/libs/crittercism*
build=(cd external/asmack && \
./build.bash && \
cp build/asmack-android-4.jar ../../libs)
Build:12.7.1,92
disable=prebuilt binaries issues - see https://dev.guardianproject.info/issues/2201
commit=12.7.1
submodules=yes
prebuild=./update-ant-build.sh && \
echo "android.library=true" >> external/MessageBar/library/project.properties && \
echo "sdk-location=$$SDK$$" >> external/asmack/local.properties && \
rm -f external/SlidingMenu/example/libs/crittercism*
build=(cd external/asmack && \
./build.bash && \
cp build/asmack-android-4.jar ../../libs)
Build:13.1.2,107
commit=13.1.2
submodules=yes
init=wget https://s3.amazonaws.com/sqlcipher/SQLCipher+for+Android+v2.2.2.zip && \
unzip SQLCipher+for+Android+v2.2.2.zip && \
cp -R SQLCipherforAndroidv2.2.2/libs . && \
cp -R SQLCipherforAndroidv2.2.2/assets . && \
rm -rf SQLCipher+for+Android+v2.2.2.zip "SQLCipher for Android v2.2.2" libs/guava-r09.jar && \
./update-ant-build.sh
srclibs=IOCipher@v0.1
prebuild=rm external/cacheword/cachewordlib/libs/iocipher.jar && \
echo 'android.library.reference.1=../../../../srclib/IOCipher' >> external/cacheword/cachewordlib/project.properties && \
echo "sdk-location=$$SDK$$" >> external/asmack/local.properties
update=no
scanignore=libs,external/SlidingMenu/example/libs
build=cd external/asmack && \
./build.bash && \
cp build/asmack-android-7.jar ../../libs
Build:14.2.2,1422001
disable=jars, binaries
commit=14.2.2
submodules=yes
prebuild=sh update-ant-build.sh
Archive Policy:0 versions
Auto Update Mode:None
Update Check Mode:Tags ^[0-9.]*$
Current Version:14.2.3
Current Version Code:1423001

View file

@ -0,0 +1,153 @@
Categories:
- Internet
License: Apache-2.0
WebSite: https://dev.guardianproject.info/projects/gibberbot
SourceCode: https://github.com/guardianproject/ChatSecureAndroid
IssueTracker: https://dev.guardianproject.info/projects/gibberbot/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: ChatSecure
Summary: Instant Messaging client with OTR
Description: |-
The app is currently completly out-of-date. We recommend getting it directly
from the developers using [https://guardianproject.info/fdroid/repo/ their
F-Droid repository]. All existing versions have been moved to our archive.
XMPP (Jabber) client that can do end-to-end encryption using the
[http://en.wikipedia.org/wiki/Off-the-Record_Messaging Off-the-Record Messaging]
protocol and can anonymize your chats via the [[org.torproject.android]] app
(root not required).
The app used to be called GibberBot.
RepoType: git
Repo: https://github.com/guardianproject/ChatSecureAndroid
Builds:
- versionName: 0.0.7-RC1
versionCode: 25
commit: e17dbbcf338af00466cabc5178634cd0d5ffded8
target: android-4
- versionName: 0.0.8-FINAL
versionCode: 31
commit: e4b49ca9508477564c2cba4cfe2821b270281218
target: android-11
- versionName: 0.0.9-RC3
versionCode: 34
commit: 9311f2ebdcf06660fa4f145a1c2d88b6b15341f3
target: android-15
- versionName: 0.0.9-RC4
versionCode: 35
commit: b3a7433be1
target: android-15
- versionName: 0.0.10-RC2
versionCode: 37
commit: v10-RC2
srclibs:
- ActionBarSherlock@4.1.0
prebuild:
- sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@' project.properties
- mkdir assets
- versionName: 0.0.10-RC6
versionCode: 41
commit: 0.0.10-RC6
srclibs:
- ActionBarSherlock@4.1.0
forceversion: true
forcevercode: true
prebuild: sed -i 's@\(android.library.reference.1=\).*@\1$$ActionBarSherlock$$@'
project.properties
- versionName: 0.0.11-RC5
versionCode: 57
commit: 92db4fe01571
submodules: true
patch:
- otr-asmack.patch
prebuild:
- rm -rf tests/ META-INF/ robo-tests/ gitian/ proguard-project.txt
- echo "sdk-location=$$SDK$$" > external/asmack/local.properties
androidupdate:
- .
- external/ActionBarSherlock/library
- external/MemorizingTrustManager
- external/OnionKit/library
build:
- ant -Dbuild.all=true -f external/asmack/build.xml
- mv external/asmack/build/asmack-android-4.jar libs/
- versionName: 12.4.1
versionCode: 82
disable: prebuilt binaries in source
commit: ee9e3dcc07134
submodules: true
prebuild:
- ./update-ant-build.sh
- echo "android.library=true" >> external/MessageBar/library/project.properties
- echo "sdk-location=$$SDK$$" >> external/asmack/local.properties
- rm -f external/SlidingMenu/example/libs/crittercism*
build:
- (cd external/asmack
- ./build.bash
- cp build/asmack-android-4.jar ../../libs)
- versionName: 12.7.1
versionCode: 92
disable: prebuilt binaries issues - see https://dev.guardianproject.info/issues/2201
commit: 12.7.1
submodules: true
prebuild:
- ./update-ant-build.sh
- echo "android.library=true" >> external/MessageBar/library/project.properties
- echo "sdk-location=$$SDK$$" >> external/asmack/local.properties
- rm -f external/SlidingMenu/example/libs/crittercism*
build:
- (cd external/asmack
- ./build.bash
- cp build/asmack-android-4.jar ../../libs)
- versionName: 13.1.2
versionCode: 107
commit: 13.1.2
submodules: true
init:
- wget https://s3.amazonaws.com/sqlcipher/SQLCipher+for+Android+v2.2.2.zip
- unzip SQLCipher+for+Android+v2.2.2.zip
- cp -R SQLCipherforAndroidv2.2.2/libs .
- cp -R SQLCipherforAndroidv2.2.2/assets .
- rm -rf SQLCipher+for+Android+v2.2.2.zip "SQLCipher for Android v2.2.2" libs/guava-r09.jar
- ./update-ant-build.sh
srclibs:
- IOCipher@v0.1
prebuild:
- rm external/cacheword/cachewordlib/libs/iocipher.jar
- echo 'android.library.reference.1=../../../../srclib/IOCipher' >> external/cacheword/cachewordlib/project.properties
- echo "sdk-location=$$SDK$$" >> external/asmack/local.properties
androidupdate:
- no
scanignore:
- libs
- external/SlidingMenu/example/libs
build:
- cd external/asmack
- ./build.bash
- cp build/asmack-android-7.jar ../../libs
- versionName: 14.2.2
versionCode: 1422001
disable: jars, binaries
commit: 14.2.2
submodules: true
prebuild: sh update-ant-build.sh
ArchivePolicy: 0 versions
AutoUpdateMode: None
UpdateCheckMode: Tags ^[0-9.]*$
CurrentVersion: 14.2.3
CurrentVersionCode: 1423001

View file

@ -1,62 +0,0 @@
Categories:Security
License:GPL-3.0-only
Web Site:https://guardianproject.info
Source Code:https://github.com/guardianproject/PixelKnot
Issue Tracker:https://github.com/guardianproject/PixelKnot/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:PixelKnot
Summary:Hide messages inside files
Description:
Image steganography app with old school F5 steganography.
Have a secret that you want to share? Why not hide it in a picture? With
PixelKnot, only your friends with the secret password can unlock your special
message. Everyone else just sees a pretty picture. Its a fun and easy way to
share hidden messages without anyone knowing. Take those pixels, twist them in a
knot, and see for yourself!
* DISGUISE YOUR MESSAGES: Pictures are public, the text is hidden inside. Even a trained eye will think the image is unedited. Its security through obscurity!
* FOR YOUR EYES ONLY: Put a password on the secret message to make sure that no one can read it except the person its meant for.
* EASY IMAGE CHOOSER: You can use the camera to take photos, or just use photos youve already taken.
* INVISIBLE CHANGES: Even a trained analyst analyst shouldnt be able to detect any message. The image bytes should seem undistorted.
* SHARE ACROSS PLATFORMS: Want to share the images over email, file sharing tools (like Dropbox & Sparkleshare), social media (like Google+ & Flickr) or directly through Bluetooth or NFC? Not a problem! The messages are still recoverable on the other side. We'll have even more tools (like Facebook) working soon, so stay tuned!
* AD-FREE: We want your love, not your money.
* MATHEMATICALLY SECURE: We use the newly developed steganography algorithm F5 which implements matrix encoding to improve the efficiency of embedding and employs permutative straddling to uniformly spread out the changes over the whole steganogram.
* ATTACK RESISTANT: Weve launched attacks on images with messages hidden in them using a specialized version of stegdetect, an automated tool for detecting steganographic content in images. In most cases, the pictures have been impervious to attack. We will be including detection in an upcoming version of the application so you can easily test it yourself!
.
Repo Type:git
Repo:https://github.com/guardianproject/PixelKnot.git
Build:0.3.1,4
commit=0.3.1
subdir=app
init=sed -i '/reference/d' project.properties
srclibs=2:ActionBarSherlock@90939dc,1:F5@ce9c78497a0cc22a
Build:0.3.3,6
commit=0.3.3
subdir=app
submodules=yes
init=mv res/values-zh_TW res/values-zh-rTW && \
mv res/values-nb_NO res/values-nb-rNO
target=android-22
Build:1.0,10
commit=1.0.0
subdir=PixelKnot
submodules=yes
gradle=yes
Build:1.0.1,101
commit=1.0.1
subdir=PixelKnot
submodules=yes
gradle=yes
Auto Update Mode:None
Update Check Mode:Tags
Current Version:1.0.1
Current Version Code:101

View file

@ -0,0 +1,72 @@
Categories:
- Security
License: GPL-3.0-only
WebSite: https://guardianproject.info
SourceCode: https://github.com/guardianproject/PixelKnot
IssueTracker: https://github.com/guardianproject/PixelKnot/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: PixelKnot
Summary: Hide messages inside files
Description: |-
Image steganography app with old school F5 steganography.
Have a secret that you want to share? Why not hide it in a picture? With
PixelKnot, only your friends with the secret password can unlock your special
message. Everyone else just sees a pretty picture. Its a fun and easy way to
share hidden messages without anyone knowing. Take those pixels, twist them in a
knot, and see for yourself!
* DISGUISE YOUR MESSAGES: Pictures are public, the text is hidden inside. Even a trained eye will think the image is unedited. Its security through obscurity!
* FOR YOUR EYES ONLY: Put a password on the secret message to make sure that no one can read it except the person its meant for.
* EASY IMAGE CHOOSER: You can use the camera to take photos, or just use photos youve already taken.
* INVISIBLE CHANGES: Even a trained analyst analyst shouldnt be able to detect any message. The image bytes should seem undistorted.
* SHARE ACROSS PLATFORMS: Want to share the images over email, file sharing tools (like Dropbox & Sparkleshare), social media (like Google+ & Flickr) or directly through Bluetooth or NFC? Not a problem! The messages are still recoverable on the other side. We'll have even more tools (like Facebook) working soon, so stay tuned!
* AD-FREE: We want your love, not your money.
* MATHEMATICALLY SECURE: We use the newly developed steganography algorithm F5 which implements matrix encoding to improve the efficiency of embedding and employs permutative straddling to uniformly spread out the changes over the whole steganogram.
* ATTACK RESISTANT: Weve launched attacks on images with messages hidden in them using a specialized version of stegdetect, an automated tool for detecting steganographic content in images. In most cases, the pictures have been impervious to attack. We will be including detection in an upcoming version of the application so you can easily test it yourself!
RepoType: git
Repo: https://github.com/guardianproject/PixelKnot.git
Builds:
- versionName: 0.3.1
versionCode: 4
commit: 0.3.1
subdir: app
init: sed -i '/reference/d' project.properties
srclibs:
- 2:ActionBarSherlock@90939dc
- 1:F5@ce9c78497a0cc22a
- versionName: 0.3.3
versionCode: 6
commit: 0.3.3
subdir: app
submodules: true
init:
- mv res/values-zh_TW res/values-zh-rTW
- mv res/values-nb_NO res/values-nb-rNO
target: android-22
- versionName: '1.0'
versionCode: 10
commit: 1.0.0
subdir: PixelKnot
submodules: true
gradle:
- yes
- versionName: 1.0.1
versionCode: 101
commit: 1.0.1
subdir: PixelKnot
submodules: true
gradle:
- yes
AutoUpdateMode: None
UpdateCheckMode: Tags
CurrentVersion: 1.0.1
CurrentVersionCode: 101

View file

@ -1,40 +0,0 @@
Categories:Security
License:GPL-3.0-or-later
Web Site:https://guardianproject.info/tag/panic
Source Code:https://github.com/guardianproject/ripple
Issue Tracker:https://dev.guardianproject.info/projects/panic/issues
LiberapayID:33617
Bitcoin:1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
Auto Name:Ripple
Summary:Trigger apps to protect your privacy when in anxious or panic situations
Description:
Ripple is a "panic button" that can send it's trigger message to any app that is
a "panic responder". Such apps can do things like lock, disguise themselves,
delete private data, send an emergency message, and more. It is meant for
situations where there is time to react, but where users need to be sure it is
not mistakenly set off.
Here are two example scenarios:
* An organization gets regularly raided by the security forces, who search all of the computers and mobile devices on the premises. The organization usually has at least a minute or two of warning before a raid starts. They need a very reliable way to trigger wiping all of the data from the sensitive apps.
* An aid worker has lots of sensitive data about people on their device. They regularly sync that data up with a secure, central database. Occasionally, the aid worker has to leave the country on very short notice. The border guards regularly download the entire contents of mobile devices of people crossing through. While waiting in line at the border, the aid worker sees the border guards seizing people's devices, and then remembers all the data on the device, so she unlocks her phone and hits the wipe trigger, which wipes all sensitive apps from the device. When the aid worker returns to the central office, the device is again synced up with the central database.
.
Repo Type:git
Repo:https://github.com/guardianproject/ripple.git
Build:0.2.1,80
commit=0.2.1
subdir=app
gradle=yes
Build:0.2.2,83
commit=0.2.2
subdir=app
gradle=yes
Auto Update Mode:Version %v
Update Check Mode:Tags
Current Version:0.1
Current Version Code:2

View file

@ -0,0 +1,45 @@
Categories:
- Security
License: GPL-3.0-or-later
WebSite: https://guardianproject.info/tag/panic
SourceCode: https://github.com/guardianproject/ripple
IssueTracker: https://dev.guardianproject.info/projects/panic/issues
LiberapayID: '33617'
Bitcoin: 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk
AutoName: Ripple
Summary: Trigger apps to protect your privacy when in anxious or panic situations
Description: |-
Ripple is a "panic button" that can send it's trigger message to any app that is
a "panic responder". Such apps can do things like lock, disguise themselves,
delete private data, send an emergency message, and more. It is meant for
situations where there is time to react, but where users need to be sure it is
not mistakenly set off.
Here are two example scenarios:
* An organization gets regularly raided by the security forces, who search all of the computers and mobile devices on the premises. The organization usually has at least a minute or two of warning before a raid starts. They need a very reliable way to trigger wiping all of the data from the sensitive apps.
* An aid worker has lots of sensitive data about people on their device. They regularly sync that data up with a secure, central database. Occasionally, the aid worker has to leave the country on very short notice. The border guards regularly download the entire contents of mobile devices of people crossing through. While waiting in line at the border, the aid worker sees the border guards seizing people's devices, and then remembers all the data on the device, so she unlocks her phone and hits the wipe trigger, which wipes all sensitive apps from the device. When the aid worker returns to the central office, the device is again synced up with the central database.
RepoType: git
Repo: https://github.com/guardianproject/ripple.git
Builds:
- versionName: 0.2.1
versionCode: 80
commit: 0.2.1
subdir: app
gradle:
- yes
- versionName: 0.2.2
versionCode: 83
commit: 0.2.2
subdir: app
gradle:
- yes
AutoUpdateMode: Version %v
UpdateCheckMode: Tags
CurrentVersion: '0.1'
CurrentVersionCode: 2