Skip to content

Prakhar1808/Sentinoid

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

36 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Sentinoid β€” Sentinel Edge

The Hardware-Bound, Air-Gapped Mobile Security Fortress


πŸ“œ Manifesto

Zero Internet Permissions. Zero Backdoors. Absolute Sovereignty.

Sentinoid binds secrets to physical silicon and biometric presence. If the device or biometric is not present, the keys do not exist.

No Cloud. No Backdoors. Absolute Sovereignty.


🎯 Principles

Principle Description
Isolation by Default The app is architecturally incapable of network communication
Hardware Binding Keys are generated and stored in TEE or StrongBox and are non-exportable
User Sovereignty Recovery is offline and user-controlled via BIP39 and Shamir shards
Transparency Core components are open source and auditable

πŸ” Core Security Pillars

Biometric-Bound Cryptographic Shroud

  • Encrypted Wrapping: AES-256-GCM for vaults and sensitive app data
  • TEE Binding: Keys generated inside the TEE and unsealed only on biometric match
  • InvalidatedByBiometricEnrollment: Adding a new biometric triggers immediate key purge

Connectivity Shield

  • Zero Internet Manifest: android.permission.INTERNET is intentionally absent
  • Air-Gap Enforcement: Runtime monitoring terminates unauthorized Wi-Fi, Bluetooth, NFC attempts
  • Unidirectional Update Diode: Updates delivered via signed BIP39 QR bundles; device never requests network access

Feature Permission Manager (FPM)

  • Service-Level Interception: Uses Accessibility and Device Admin to intercept Mic, Camera, GPS calls
  • Mock-Stream Injection: Unauthorized callers receive null or static streams to avoid alerting malware while preserving OS stability

πŸ›‘οΈ Advanced Tactical Defense

Honeypot Trap

  • Ghost Data: AI-generated decoy logs and files that look realistic to scrapers
  • Silent Alarm: Unauthorized access to ghost data triggers local Total Lockdown and records hardware ID

Hardware Watchdog & Anti-Tamper

  • Integrity Monitoring: Detects rooting, bootloader unlock, USB debugging, and voltage anomalies
  • Self-Destruct Protocol: Hardware keys are purged on tamper conditions or unauthorized biometric enrollment

Local Heuristic Malware Engine

  • Offline Behavioral Analysis: Compressed INT8 TFLite model for overlay and screen-scraping detection
  • Compressed Hash Registry: Local signatures for known threats
  • Battery Optimized: Asynchronous scanning designed for minimal drain (demo target <1%)

πŸ—οΈ Architecture Summary

Three Atmospheres share one core engine (LACE) and a hardware abstraction layer.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                           SENTINOID SUITE                                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚   LITE              β”‚  β”‚   ULTRA             β”‚  β”‚   MOBILE-A           β”‚  β”‚
β”‚  β”‚   Universal Androidβ”‚  β”‚   AMD PC            β”‚  β”‚   Samsung S26 + AMD β”‚  β”‚
β”‚  β”‚                     β”‚  β”‚                     β”‚  β”‚                      β”‚  β”‚
β”‚  β”‚  β€’ BIP39+Shamir     β”‚  β”‚  β€’ NPU/Accelerator  β”‚  β”‚  β€’ RDNA Shroud      β”‚  β”‚
β”‚  β”‚  β€’ Deception       β”‚  β”‚  β€’ SEV-SNP          β”‚  β”‚  β€’ Gait-Lock        β”‚  β”‚
β”‚  β”‚    Honeypot        β”‚  β”‚    Isolation        β”‚  β”‚  β€’ NPU Heuristics   β”‚  β”‚
β”‚  β”‚  β€’ LACE Core       β”‚  β”‚  β€’ Side-Channel     β”‚  β”‚                      β”‚  β”‚
β”‚  β”‚                     β”‚  β”‚    Jamming          β”‚  β”‚                      β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚            β”‚                         β”‚                         β”‚              β”‚
β”‚            β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜              β”‚
β”‚                                      β”‚                                        β”‚
β”‚                           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                            β”‚
β”‚                           β”‚   LACE Core Engine   β”‚                            β”‚
β”‚                           β”‚   INT8 TFLite + HAL  β”‚                            β”‚
β”‚                           β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                            β”‚
β”‚                                                                              β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Three Atmospheres

Atmosphere Target Hardware Focus
LITE Universal Android/ARM Deception honeypot, BIP39 + Shamir recovery, lightweight LACE core
ULTRA AMD PC (High-performance) NPU/accelerator offload, side-channel jamming, SEV-SNP isolation
MOBILE-A Samsung S26 with AMD accelerator RDNA frame-buffer obfuscation, NPU-driven gait/proximity locks

Hardware Auto Detect

HAL chooses execution path: NPU β†’ OpenVINO/AVX β†’ Standard C++ heuristics.

Adoption Bridge

Bridge Mode uses USB encrypted telemetry so high-performance AMD PCs can act as local security clouds for budget devices without Internet.


βš™οΈ Core Components

Component Description
LACE Local AI Engine β€” Quantized INT8 TFLite (distilled CNN + Random Forest). CPU/XNNPACK on LITE; offload to AMD accelerators on ULTRA and MOBILE-A
Shroud Biometric + TEE binding; keys invalidated on unauthorized enrollment
Shield Hardware air-lock; unidirectional update diode via signed BIP39 QR bundles
Tactical Layer Local heuristic engine; AI-generated honeypot and entropy file systems
Watchdog Hardware watchdog integrated with secure processor; monitors voltage, timing, and side-channel anomalies
Recovery BIP39 + Shamir's Secret Sharing (2-of-3 shards: paper, hardware, biometric)

πŸ”’ Security Enhancements

  • Post-Quantum Cryptography: Kyber-768 and Dilithium hybrid for vault sealing and signatures
  • Acoustic Masking: NPU-driven ultrasonic jitter to prevent sonic PIN exfiltration
  • Side-Channel Jamming: Randomized accelerator power and emission patterns to mask EM and acoustic signatures on ULTRA and MOBILE-A

πŸ“… Roadmap & Prototype Plan

Goal: Deliver an auditable Sentinoid prototype demonstrating hardware-bound keys, zero-internet operation, offline recovery, honeypot detection, local heuristic detection, and a Bridge Mode demo with accelerator offload simulation.

Duration: 4 weeks (28 days)

Week 1 β€” Core Crypto & Recovery

  • Day 1–2: Implement BIP39 provider and unit tests
  • Day 3–4: Implement AES-256-GCM vault wrapper and Keystore integration
  • Day 5–7: Implement TEE binding and InvalidatedByBiometricEnrollment lifecycle
  • Milestone: Offline Emergency Recovery using 2 of 3 shards

Week 2 β€” Interception & Honeypot

  • Day 8–10: Build FPMInterceptor using Accessibility and Device Admin hooks
  • Day 11–13: Implement HoneypotEngine and silent alarm logging
  • Day 14: Integrate WatchdogService root/bootloader checks
  • Milestone: Ghost file access triggers local lockdown

Week 3 β€” Local AI & Optimization

  • Day 15–17: Integrate malware_model.tflite and wire LACE inference pipeline
  • Day 18–20: Optimize inference with XNNPACK and quantized INT8 path
  • Day 21: Battery profiling and tuning
  • Milestone: Heuristic detection with minimal battery impact

Week 4 β€” Bridge Mode & Demo Polish

  • Day 22–24: Implement USB Bridge Mode and Action Token protocol
  • Day 25–26: Add accelerator offload simulation and performance gauge UI
  • Day 27: Full end-to-end hero demo run
  • Day 28: Final audit pass and prepare demo assets
  • Milestone: Successful hero demo and audit checklist

πŸ“ Project Structure

Sentinoid/
β”œβ”€β”€ app/
β”‚   β”œβ”€β”€ src/main/cpp/
β”‚   β”‚   └── SecurityModule.cpp
β”‚   β”œβ”€β”€ src/main/kotlin/
β”‚   β”‚   β”œβ”€β”€ WatchdogService.kt
β”‚   β”‚   β”œβ”€β”€ FPMInterceptor.kt
β”‚   β”‚   β”œβ”€β”€ HoneypotEngine.kt
β”‚   β”‚   └── BIP39Provider.kt
β”‚   └── AndroidManifest.xml
β”œβ”€β”€ assets/
β”‚   └── malware_model.tflite
β”œβ”€β”€ docs/
β”‚   β”œβ”€β”€ architecture_diagram_text.md
β”‚   └── pitch_90s_script.md
β”œβ”€β”€ vendor/
β”‚   └── mobile_a_samsung_s26_module/
└── Makefile

πŸ› οΈ Quick Start

1. Clone and Build

git clone https://github.com/Prakhar1808/Sentinoid.git
cd Sentinoid

# Build the C++ LACE core
make

2. Install APK

# Install LITE APK on an air-gapped test device
adb install app/build/outputs/apk/debug/app-debug.apk

3. Run Emergency Recovery

  1. Launch the app
  2. Navigate to Recovery
  3. Enter 2 of 3 BIP39 shards
  4. Validate offline seed reconstitution

4. Test Honeypot

  1. Access ghost/decoy files
  2. Observe Silent Alarm triggering
  3. Verify local lockdown activation

5. Optional: MOBILE-A Module

On Samsung S26 with AMD accelerator:

adb install vendor/mobile_a_samsung_s26_module/*.apk

βœ… Testing & Validation Checklist

  • Confirm android.permission.INTERNET absent in built manifest
  • Validate TEE key lifecycle and InvalidatedByBiometricEnrollment behavior
  • Reconstruct BIP39 seed from two shards offline
  • Honeypot triggers lockdown on ghost file access
  • FPM returns mock streams without crashing OS
  • LACE detects simulated overlay and scraper events
  • Battery profiling meets demo drain target (<1%)
  • Offload simulation shows CPU vs accelerator usage graph
  • MOBILE-A verification ensures vendor module activates only on Samsung S26 with AMD accelerator

πŸ“‹ Formatting the Files before Contributing

will be implemented in the next PR, under construction

Check formatting

./gradlew spotlessCheck

Auto-fix formatting

./gradlew spotlessApply

Behavior:

  • Pre-commit hook: Warns on violations but allows commit (run spotlessApply to fix)
  • GitHub Actions: Fails build on any violation (strict) The CI workflow runs spotlessCheck before building - any formatting violations will fail the CI build.

πŸ“‹ Technical Specifications

Component Technology Detail
Encryption AES-256-GCM, Kyber-768, Dilithium Hardware-backed, PQC hybrid
Connectivity Air-Gapped Strict Zero-Internet Policy
Recovery BIP39 Mnemonic + Shamir 24-word seed split into 2-of-3 shards
Key Storage Android Keystore, StrongBox Non-exportable, TEE-bound keys
Interception Accessibility Framework Service-level hardware call masking

πŸ’» Hardware Support

Tier Hardware Model Latency
ULTRA AMD PC (High-performance) Qwen2.5-7B ~50ms
MOBILE-A Samsung S26 + AMD Native NPU ~30ms
LITE Android 8+ (2GB RAM) INT8 TFLite ~500ms

βš–οΈ License

GNU General Public License v3.0 (GPL-3.0) for core components.

Audit Targets

  • AndroidManifest.xml: Confirm absence of android.permission.INTERNET
  • SecurityModule.cpp: Review hardware-bound key derivation
  • BIP39Provider.kt: Verify offline seed generation and shard logic
  • Makefile & Build Scripts: Ensure no hidden network steps in CI

Suggested Audit Steps

  1. Build from source in an air-gapped environment
  2. Inspect binary for network syscall usage
  3. Validate TEE key lifecycle and InvalidatedByBiometricEnrollment behavior
  4. Reproduce recovery using two shards offline

🀝 Contribution and Governance

  • Open Source Core: Core LITE components are GPL-3.0
  • Hardware Vendor Hooks: Documented and optional
  • Contribution Guidelines: Use issue tracker for feature requests and security disclosures
  • Responsible Disclosure: Report security issues via repository security policy

πŸ“š Documentation


Sentinoid: Secure by Design. Isolated by Choice.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors