The Hardware-Bound, Air-Gapped Mobile Security Fortress
Zero Internet Permissions. Zero Backdoors. Absolute Sovereignty.
Sentinoid binds secrets to physical silicon and biometric presence. If the device or biometric is not present, the keys do not exist.
No Cloud. No Backdoors. Absolute Sovereignty.
| Principle | Description |
|---|---|
| Isolation by Default | The app is architecturally incapable of network communication |
| Hardware Binding | Keys are generated and stored in TEE or StrongBox and are non-exportable |
| User Sovereignty | Recovery is offline and user-controlled via BIP39 and Shamir shards |
| Transparency | Core components are open source and auditable |
- Encrypted Wrapping: AES-256-GCM for vaults and sensitive app data
- TEE Binding: Keys generated inside the TEE and unsealed only on biometric match
- InvalidatedByBiometricEnrollment: Adding a new biometric triggers immediate key purge
- Zero Internet Manifest:
android.permission.INTERNETis intentionally absent - Air-Gap Enforcement: Runtime monitoring terminates unauthorized Wi-Fi, Bluetooth, NFC attempts
- Unidirectional Update Diode: Updates delivered via signed BIP39 QR bundles; device never requests network access
- Service-Level Interception: Uses Accessibility and Device Admin to intercept Mic, Camera, GPS calls
- Mock-Stream Injection: Unauthorized callers receive null or static streams to avoid alerting malware while preserving OS stability
- Ghost Data: AI-generated decoy logs and files that look realistic to scrapers
- Silent Alarm: Unauthorized access to ghost data triggers local Total Lockdown and records hardware ID
- Integrity Monitoring: Detects rooting, bootloader unlock, USB debugging, and voltage anomalies
- Self-Destruct Protocol: Hardware keys are purged on tamper conditions or unauthorized biometric enrollment
- Offline Behavioral Analysis: Compressed INT8 TFLite model for overlay and screen-scraping detection
- Compressed Hash Registry: Local signatures for known threats
- Battery Optimized: Asynchronous scanning designed for minimal drain (demo target <1%)
Three Atmospheres share one core engine (LACE) and a hardware abstraction layer.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β SENTINOID SUITE β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β βββββββββββββββββββββββ βββββββββββββββββββββββ ββββββββββββββββββββββββ β
β β LITE β β ULTRA β β MOBILE-A β β
β β Universal Androidβ β AMD PC β β Samsung S26 + AMD β β
β β β β β β β β
β β β’ BIP39+Shamir β β β’ NPU/Accelerator β β β’ RDNA Shroud β β
β β β’ Deception β β β’ SEV-SNP β β β’ Gait-Lock β β
β β Honeypot β β Isolation β β β’ NPU Heuristics β β
β β β’ LACE Core β β β’ Side-Channel β β β β
β β β β Jamming β β β β
β βββββββββββ¬ββββββββββββ ββββββββββββ¬βββββββββββ ββββββββββββ¬ββββββββββββ β
β β β β β
β βββββββββββββββββββββββββββΌββββββββββββββββββββββββββ β
β β β
β ββββββββββββΌβββββββββββ β
β β LACE Core Engine β β
β β INT8 TFLite + HAL β β
β ββββββββββββββββββββββββ β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
| Atmosphere | Target Hardware | Focus |
|---|---|---|
| LITE | Universal Android/ARM | Deception honeypot, BIP39 + Shamir recovery, lightweight LACE core |
| ULTRA | AMD PC (High-performance) | NPU/accelerator offload, side-channel jamming, SEV-SNP isolation |
| MOBILE-A | Samsung S26 with AMD accelerator | RDNA frame-buffer obfuscation, NPU-driven gait/proximity locks |
HAL chooses execution path: NPU β OpenVINO/AVX β Standard C++ heuristics.
Bridge Mode uses USB encrypted telemetry so high-performance AMD PCs can act as local security clouds for budget devices without Internet.
| Component | Description |
|---|---|
| LACE | Local AI Engine β Quantized INT8 TFLite (distilled CNN + Random Forest). CPU/XNNPACK on LITE; offload to AMD accelerators on ULTRA and MOBILE-A |
| Shroud | Biometric + TEE binding; keys invalidated on unauthorized enrollment |
| Shield | Hardware air-lock; unidirectional update diode via signed BIP39 QR bundles |
| Tactical Layer | Local heuristic engine; AI-generated honeypot and entropy file systems |
| Watchdog | Hardware watchdog integrated with secure processor; monitors voltage, timing, and side-channel anomalies |
| Recovery | BIP39 + Shamir's Secret Sharing (2-of-3 shards: paper, hardware, biometric) |
- Post-Quantum Cryptography: Kyber-768 and Dilithium hybrid for vault sealing and signatures
- Acoustic Masking: NPU-driven ultrasonic jitter to prevent sonic PIN exfiltration
- Side-Channel Jamming: Randomized accelerator power and emission patterns to mask EM and acoustic signatures on ULTRA and MOBILE-A
Goal: Deliver an auditable Sentinoid prototype demonstrating hardware-bound keys, zero-internet operation, offline recovery, honeypot detection, local heuristic detection, and a Bridge Mode demo with accelerator offload simulation.
Duration: 4 weeks (28 days)
- Day 1β2: Implement BIP39 provider and unit tests
- Day 3β4: Implement AES-256-GCM vault wrapper and Keystore integration
- Day 5β7: Implement TEE binding and InvalidatedByBiometricEnrollment lifecycle
- Milestone: Offline Emergency Recovery using 2 of 3 shards
- Day 8β10: Build FPMInterceptor using Accessibility and Device Admin hooks
- Day 11β13: Implement HoneypotEngine and silent alarm logging
- Day 14: Integrate WatchdogService root/bootloader checks
- Milestone: Ghost file access triggers local lockdown
- Day 15β17: Integrate malware_model.tflite and wire LACE inference pipeline
- Day 18β20: Optimize inference with XNNPACK and quantized INT8 path
- Day 21: Battery profiling and tuning
- Milestone: Heuristic detection with minimal battery impact
- Day 22β24: Implement USB Bridge Mode and Action Token protocol
- Day 25β26: Add accelerator offload simulation and performance gauge UI
- Day 27: Full end-to-end hero demo run
- Day 28: Final audit pass and prepare demo assets
- Milestone: Successful hero demo and audit checklist
Sentinoid/
βββ app/
β βββ src/main/cpp/
β β βββ SecurityModule.cpp
β βββ src/main/kotlin/
β β βββ WatchdogService.kt
β β βββ FPMInterceptor.kt
β β βββ HoneypotEngine.kt
β β βββ BIP39Provider.kt
β βββ AndroidManifest.xml
βββ assets/
β βββ malware_model.tflite
βββ docs/
β βββ architecture_diagram_text.md
β βββ pitch_90s_script.md
βββ vendor/
β βββ mobile_a_samsung_s26_module/
βββ Makefile
git clone https://github.com/Prakhar1808/Sentinoid.git
cd Sentinoid
# Build the C++ LACE core
make# Install LITE APK on an air-gapped test device
adb install app/build/outputs/apk/debug/app-debug.apk- Launch the app
- Navigate to Recovery
- Enter 2 of 3 BIP39 shards
- Validate offline seed reconstitution
- Access ghost/decoy files
- Observe Silent Alarm triggering
- Verify local lockdown activation
On Samsung S26 with AMD accelerator:
adb install vendor/mobile_a_samsung_s26_module/*.apk- Confirm
android.permission.INTERNETabsent in built manifest - Validate TEE key lifecycle and InvalidatedByBiometricEnrollment behavior
- Reconstruct BIP39 seed from two shards offline
- Honeypot triggers lockdown on ghost file access
- FPM returns mock streams without crashing OS
- LACE detects simulated overlay and scraper events
- Battery profiling meets demo drain target (<1%)
- Offload simulation shows CPU vs accelerator usage graph
- MOBILE-A verification ensures vendor module activates only on Samsung S26 with AMD accelerator
will be implemented in the next PR, under construction
./gradlew spotlessCheck./gradlew spotlessApplyBehavior:
- Pre-commit hook: Warns on violations but allows commit (run spotlessApply to fix)
- GitHub Actions: Fails build on any violation (strict) The CI workflow runs spotlessCheck before building - any formatting violations will fail the CI build.
| Component | Technology | Detail |
|---|---|---|
| Encryption | AES-256-GCM, Kyber-768, Dilithium | Hardware-backed, PQC hybrid |
| Connectivity | Air-Gapped | Strict Zero-Internet Policy |
| Recovery | BIP39 Mnemonic + Shamir | 24-word seed split into 2-of-3 shards |
| Key Storage | Android Keystore, StrongBox | Non-exportable, TEE-bound keys |
| Interception | Accessibility Framework | Service-level hardware call masking |
| Tier | Hardware | Model | Latency |
|---|---|---|---|
| ULTRA | AMD PC (High-performance) | Qwen2.5-7B | ~50ms |
| MOBILE-A | Samsung S26 + AMD | Native NPU | ~30ms |
| LITE | Android 8+ (2GB RAM) | INT8 TFLite | ~500ms |
GNU General Public License v3.0 (GPL-3.0) for core components.
- AndroidManifest.xml: Confirm absence of
android.permission.INTERNET - SecurityModule.cpp: Review hardware-bound key derivation
- BIP39Provider.kt: Verify offline seed generation and shard logic
- Makefile & Build Scripts: Ensure no hidden network steps in CI
- Build from source in an air-gapped environment
- Inspect binary for network syscall usage
- Validate TEE key lifecycle and InvalidatedByBiometricEnrollment behavior
- Reproduce recovery using two shards offline
- Open Source Core: Core LITE components are GPL-3.0
- Hardware Vendor Hooks: Documented and optional
- Contribution Guidelines: Use issue tracker for feature requests and security disclosures
- Responsible Disclosure: Report security issues via repository security policy
- Hardware Setup Guide
- AOA Protocol Details
- Security Prompts
- Architecture Diagram
- 90-Second Pitch Script
Sentinoid: Secure by Design. Isolated by Choice.