Technical security overview for teams operating in sensitive environments
XOPOZ is a GPS team tracking application that implements end-to-end encryption for location data with a zero-knowledge server architecture. This brief provides a transparent assessment of what XOPOZ protects against, what it does not protect against, and how to configure it for maximum security in sensitive operational environments.
| Threat Scenario | Protection Level | Mechanism |
|---|---|---|
| Server database breach | PROTECTED | Server stores only AES-128 encrypted blobs. No keys on server. |
| Network traffic interception | PROTECTED | HTTPS transport + payload already encrypted before transmission. |
| Google infrastructure surveillance | PROTECTED | Zero Google dependencies. No Play Services, Analytics, or Firebase. |
| Cross-team data leakage | PROTECTED | Independent 16-byte keys per team. Complete cryptographic isolation. |
| File system forensics after deletion | PROTECTED | 0xFF byte overwrite before file unlink. Database overwrite with fake data. |
| Server-side location data selling | PROTECTED | Architecturally impossible. Server has no access to plaintext coordinates. |
| Cloud backup exposure | PROTECTED | Android backup explicitly disabled for all data domains. |
| Government subpoena of server data | PROTECTED | Encrypted blobs only. Compliant with subpoena but reveals no locations. |
| Threat Scenario | Protection Level | Explanation |
|---|---|---|
| Physical access to unlocked device | NOT PROTECTED | If attacker has the unlocked phone, they can see decrypted data through the app. |
| Malicious team member | NOT PROTECTED | Any team member with the key can decrypt all team positions. Vet your team. |
| Device compromise (malware/root) | NOT PROTECTED | Advanced malware with root access could intercept data in the app's memory. |
| Replay of encrypted payloads | NOT PROTECTED | Accepted: only possible by already-authenticated actors. Grants no additional access. |
| Historical data on compromised device | NOT PROTECTED | If a device with cached data is seized before deletion, cached data is accessible. |
A critical security property for many sensitive use cases is the absence of Google infrastructure in the data pipeline. XOPOZ achieves this completely:
| Component | Specification |
|---|---|
| GPS encryption | AES-128-ECB with 64-bit embedded IV, hardware-accelerated |
| Message encryption | AES-128-CBC with random IV, PKCS7 padding, CRC32 integrity |
| Key hierarchy | AES-256/GCM master key in Android Keystore HSM |
| Team authentication | SHA-256 challenge-response (zero-knowledge) |
| Key storage | Base64(AES-256-GCM-encrypted) in private SharedPreferences |
| Data deletion | 0xFF byte overwrite + file unlink (forensic-resistant) |
| Android backup | Disabled for all domains (shared_prefs, database, files, cache, external) |
| Authentication | RSA-256 signed JWT with AES-CBC encrypted local storage |
| Server logging | GPS coordinates stripped to integers in all logs |
| Transport | HTTPS with certificate pinning |
XOPOZ welcomes independent security reviews from qualified cryptographers, digital security organizations, and human rights technology groups. We are transparent about our architecture and explicit about our threat model because we believe that trust in security tools must be earned through openness, not marketing claims.
For audit inquiries, responsible disclosure, or security questions:
tiri@tiritix.com