Security & Investigation
Kotlin, AOSP, Android SDK
Our client is a hardware and software provider specializing in data security. They planned to launch a cutting-edge Android smartphone seamlessly integrated with their blockchain network, positioning it as a portable, highly protected crypto wallet. The company aimed to develop a phone that, in addition to its core functions, creates a safe environment for secure crypto transactions.
To this end, the client decided to empower their custom firmware with a unique system application designed to record all events occurring with the phone when it’s not in use. The goal was to increase the device’s security even more and thus improve user trust in the client’s company and their product.
After attempting to build the app in-house, the client decided to turn to a tech partner with greater expertise and chose NIX as a reliable and proven software engineering vendor. Our task was to analyze their early developments and use them as a basis whenever possible to create a default system application for their custom firmware.
No final product vision. The client had a general business idea, but due to the lack of mobile development expertise, they couldn’t see the final picture regarding app functionality and design.
Custom firmware under development. We needed to develop an app taking into account the technical constraints of integrating it with the custom firmware, which was still under development.
Tight deadlines. We had to meet the scheduled deadlines since the client had already planned the smartphone’s release, followed by its presentation.
To minimize risks and realize a finalized scope of work, we started our project with the following steps:
We built the app by modifying the Android Open Source Project (AOSP) and using the features available in the Android SDK. Among them are Bluetooth, content providers for getting information about launching and closing applications, broadcast receivers for tracking the locking and unlocking of a mobile phone, and many others.
To provide an even greater level of protection, we encrypted the tracked data using a symmetric method based on the SHA-256 algorithm.
The application works in the foreground, offline, storing data in a cache and monitoring events such as:
The app records the events in the log, designed in a visually appealing tabular format, and captures the other user’s actions through screenshots. It also takes a webcam photo of the user if the screen unlocks.
We helped the client release the phone on schedule. Supplemented with a secured system app, it now attracts customers who want full control over their devices.
The phone is already available worldwide and has found a loyal audience among users interested in cryptocurrencies, blockchain technologies, and secure crypto transactions. The unique app functionality encourages customers to choose this particular device over other analogs on the market, for they know their smartphones are protected to the maximum.
6 experts (Project Manager, 3 Android Developers, QA Engineer, Business Analyst)
Kotlin, AOSP, Android SDK, ViewModel, Coroutines, Hilt
Cybersecurity AWS platform that is easily scalable, features cost-effective infrastructure, and is backed up by robust security measures.
See more success stories
Our representative gets in touch with you within 24 hours.
We delve into your business needs and our expert team drafts the optimal solution for your project.
You receive a proposal with estimated effort, project timeline and recommended team structure.
Blockchain security: what is it? Why do you need a special approach to ensure it? Learn tips and tricks in our article.
Building a GPS application can be a real challenge, but understanding the consequence of app development and involving an experienced tech partner into your project will bring your idea to reality.
This article describes how your business can reduce operational and IT costs with help of tech solutions during a global crisis while maintaining business growth.
What exactly is serverless architecture? What are its main specifics? For which applications is it the best option? Let’s find out all of these in our article.
Digital marketing and machine learning: advanced technologies as the key to success for your business.
How can Infrastructure as Code lower your costs and accelerate development? Learn more about IaC tools and best practices.
IoT is a fast-growing technology that has already penetrated multiple industries. Let’s discuss the use cases and advantages across various sectors.
Looking for a trusted MLaaS vendor? Choose the best one with our Amazon vs Microsoft Azure vs Google Cloud AI vs IBM Watson in-depth overview.
With the constant uptick of cybercrime, having a fully-fledged cybersecurity risk management strategy can help you safeguard your valuable data and avoid threats.
See more insights