Security Assessment

XOPOZ Security Brief

Technical security overview for teams operating in sensitive environments

Prepared for: Journalists, NGOs, Human Rights Workers, and Digital Security Trainers

Executive Summary

XOPOZ is a GPS team tracking application that implements end-to-end encryption for location data with a zero-knowledge server architecture. This brief provides a transparent assessment of what XOPOZ protects against, what it does not protect against, and how to configure it for maximum security in sensitive operational environments.

Key Security Properties: GPS coordinates are encrypted on-device before any transmission. The server stores only encrypted data and does not possess decryption keys. There is zero dependency on Google infrastructure. Data deletion uses forensic-resistant byte overwriting.

Threat Model: What XOPOZ Protects

Threat Scenario Protection Level Mechanism
Server database breach PROTECTED Server stores only AES-128 encrypted blobs. No keys on server.
Network traffic interception PROTECTED HTTPS transport + payload already encrypted before transmission.
Google infrastructure surveillance PROTECTED Zero Google dependencies. No Play Services, Analytics, or Firebase.
Cross-team data leakage PROTECTED Independent 16-byte keys per team. Complete cryptographic isolation.
File system forensics after deletion PROTECTED 0xFF byte overwrite before file unlink. Database overwrite with fake data.
Server-side location data selling PROTECTED Architecturally impossible. Server has no access to plaintext coordinates.
Cloud backup exposure PROTECTED Android backup explicitly disabled for all data domains.
Government subpoena of server data PROTECTED Encrypted blobs only. Compliant with subpoena but reveals no locations.

Threat Model: What XOPOZ Does NOT Protect

Transparency Notice: The following threats are explicitly out of scope. This is by design. No application can protect against all threat vectors. Understanding limitations is essential for operational security planning.
Threat Scenario Protection Level Explanation
Physical access to unlocked device NOT PROTECTED If attacker has the unlocked phone, they can see decrypted data through the app.
Malicious team member NOT PROTECTED Any team member with the key can decrypt all team positions. Vet your team.
Device compromise (malware/root) NOT PROTECTED Advanced malware with root access could intercept data in the app's memory.
Replay of encrypted payloads NOT PROTECTED Accepted: only possible by already-authenticated actors. Grants no additional access.
Historical data on compromised device NOT PROTECTED If a device with cached data is seized before deletion, cached data is accessible.
Operational Recommendation: If operating in high-risk environments, minimize the data retention period (Settings: 1 day), disable local save when not needed, and enable device encryption at the Android OS level. Consider using XOPOZ on a dedicated device that can be wiped if necessary.

Practical Security Scenarios

Scenario: Your organization's server is breached by a state actor
Result: Attacker obtains encrypted blobs. Without team keys (which are only on member devices), location data is unrecoverable. AES-128 encryption makes brute force computationally infeasible.
Scenario: A journalist's phone is confiscated at a border checkpoint
Result: If the phone is locked and using Android encryption, data is protected by the device passcode. If the phone is unlocked, the attacker can access the XOPOZ app and see decrypted data. Mitigation: Use minimum data retention (1 day), use device wipe capabilities, keep phone locked.
Scenario: A team member's credentials are stolen via phishing
Result: The attacker can authenticate to the server as that user, but GPS positions on the server are encrypted. The attacker cannot decrypt them without the team key, which is stored only on team members' devices. The stolen credentials alone do not grant location visibility.
Scenario: Network traffic is intercepted in a country with deep packet inspection
Result: HTTPS protects the transport layer. Even if HTTPS is broken through a government-issued CA certificate, the GPS payload is already encrypted with AES-128 before transmission. The attacker sees encrypted coordinates they cannot decrypt.
Scenario: An NGO needs to comply with a GDPR data subject access request
Result: XOPOZ implements all GDPR data subject rights. Data can be exported (GPX/CSV/JSON), modified, or permanently deleted with secure byte overwriting. No hidden backups exist. Android system backup is disabled.
Scenario: A device is wiped or the app is uninstalled
Result: All team encryption keys stored in the Android Keystore are destroyed. Without these keys, any encrypted data remaining on the server is permanently unreadable. The user account remains active for reinstallation, but team keys must be re-shared via new group tickets.

No Google Infrastructure

A critical security property for many sensitive use cases is the absence of Google infrastructure in the data pipeline. XOPOZ achieves this completely:

Compatibility: XOPOZ runs on GrapheneOS, CalyxOS, LineageOS, /e/OS, Huawei (HMS), and any Android 7.0+ device regardless of Google service availability.

Recommended Security Configuration

High-Security Profile (Journalists in Hostile Regions)

Standard Security Profile (NGO Field Teams)

Key Technical Specifications

ComponentSpecification
GPS encryptionAES-128-ECB with 64-bit embedded IV, hardware-accelerated
Message encryptionAES-128-CBC with random IV, PKCS7 padding, CRC32 integrity
Key hierarchyAES-256/GCM master key in Android Keystore HSM
Team authenticationSHA-256 challenge-response (zero-knowledge)
Key storageBase64(AES-256-GCM-encrypted) in private SharedPreferences
Data deletion0xFF byte overwrite + file unlink (forensic-resistant)
Android backupDisabled for all domains (shared_prefs, database, files, cache, external)
AuthenticationRSA-256 signed JWT with AES-CBC encrypted local storage
Server loggingGPS coordinates stripped to integers in all logs
TransportHTTPS with certificate pinning

Open for Security Audit

XOPOZ welcomes independent security reviews from qualified cryptographers, digital security organizations, and human rights technology groups. We are transparent about our architecture and explicit about our threat model because we believe that trust in security tools must be earned through openness, not marketing claims.

For audit inquiries, responsible disclosure, or security questions:

tiri@tiritix.com