{"id":30910,"date":"2017-12-24T11:51:43","date_gmt":"2017-12-24T16:51:43","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=30910"},"modified":"2017-12-24T11:51:43","modified_gmt":"2017-12-24T16:51:43","slug":"the-intercept-edward-snowdens-new-app-uses-your-smartphone-to-physically-guard-your-laptop","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=30910","title":{"rendered":"The Intercept: Edward Snowden&#8217;s New App Uses Your Smartphone to Physically Guard Your Laptop"},"content":{"rendered":"<p>The Intercept: <a href=\"https:\/\/theintercept.com\/2017\/12\/22\/snowdens-new-app-uses-your-smartphone-to-physically-guard-your-laptop\/\">Edward Snowden&#8217;s New App Uses Your Smartphone to Physically Guard Your Laptop<\/a> <\/p>\n<blockquote><p>Haven uses the smartphone&#8217;s many sensors &#8211; microphone, motion detector, light detector, and cameras &#8211; to monitor the room for changes, and it logs everything it notices.<br \/>\n<!--more--><br \/>\n&#8230;<\/p>\n<p>Edward Snowden and his friends have a solution. The NSA whistleblower and a team of collaborators have been working on a new open source Android app called Haven that you install on a spare smartphone, turning the device into a sort of sentry to watch over your laptop. Haven uses the smartphone\u2019s many sensors \u2014 microphone, motion detector, light detector, and cameras \u2014 to monitor the room for changes, and it logs everything it notices. The first public beta version of Haven has officially been released; it\u2019s available in the Play Store and on F-Droid, an open source app store for Android.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The Intercept: Edward Snowden&#8217;s New App Uses Your Smartphone to Physically Guard Your Laptop Haven uses the smartphone&#8217;s many sensors &#8211; microphone, motion detector, light detector, and cameras &#8211; to monitor the room for changes, and it logs everything it &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=30910\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,76],"tags":[],"class_list":["post-30910","post","type-post","status-publish","format-standard","hentry","category-computer-searches","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30910"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30910\/revisions"}],"predecessor-version":[{"id":30911,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30910\/revisions\/30911"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}