alt text


The Media MicroCloud app has among its components the Nanohttpd web server, the elFinder file manager and a IOCipher encrypted filesystem. This makes a flexible and powerful tool. To demonstrate this let’s walk through a scenario that might be somewhat common in certain security conscious circles.

The Scenario

Our friend Bob is known as a security freak among his circle of friends. He and his friends meet periodically to brief each other on birds-of-feather topics and discuss events of the day. Bob is going to present a brief on digital security. Bob has used the popular Reveal.js and had recently discovered Media MicroCloud and decided to use it to help give his brief.

alt text


Steps To Run Reveal.js

  1. On his Android browser, he went to revealjs.com and downloaded the .zip file.
  2. He started Media MicroCloud and selected File Manager.
  3. He browsed to the Downloads folder, selected the “reveal.js-master.zip” file and then Copy.
  4. He browsed to the Crypto volume, long pressed to create the pop-up menu, selected New folder and entered “Security brief”.
  5. He selected his new folder and selected the Paste command
  6. He selected the “reveal.js-master.zip” file and then the command Extract files from archive > Here.
  7. He surfed into the new folder, selected “demo.html”, selected the command Get info and pressed the link.

That’s it, he now has the Reveal.js demo presentation on his Android. He can swipe right to advance slides, swipe down to dive into details, etc.

Brief Creation, First Draft

Bob is not a programmer but he has used Reveal.js before, it uses a simple text file for input. For most slides he simply uses Markdown but on a few he can add a little HTML to keep things interesting. To speed the process he does most of the work on his Mac.

  1. In Media MicroCloud, he returns to the home page to note the server address, puts this into his Mac’s Safari browser (could use any browser) and there is elFinder on the big screen.
  2. He browses to “demo.html”, selects Download, renames the file to “security-brief.html” and edits the file on his Mac with his favorite editor.
  3. To keep things interesting he collects a few .jpg and .png images and for fun an animated .gif file.
  4. With the draft written, uploading files to his Android’s Crypto volume is as easy as drag-and-drop.
  5. Using the same procedure as before he selects “security-brief.html” and the command File info and then hits the link.

Briefing Review

Bob is feeling really good at this point. His has draft brief is ready for review. He has a few options. He could export the brief to a .pdf file and send it to colleagues via email and this is handy but instead, he will use is lunch hour to good use. He is having lunch with a fellow security freak friend and he is able to go through the brief right there on his Android. They flip back and forth through the slides and decide the brief is pretty solid with a need for only a few changes. In a pinch, Bob could even edit the brief (or any text file) right on his Android. To do this he just selects “security-brief.html” and Edit file.

Now bob is feeling really really good. His brief is ready to go but he feels extra good because he feels secure. You see his briefing is stored in the Crypto (IOCipher) volume and cannot be read by any other app on his Android. Even if his phone is rooted, no other app on his phone can snoop his private files. The files are not just hidden but they are AES 256-bit encrypted.

Briefing Time

Bob is now ready for his brief and has everything he needs in his pocket, his Android phone. The meeting host has a PC attached to a large screen TV. To display the brief he has options.

alt text


Bob has options

  1. He could start the brief on his phone and use Chromecast.
  2. He could use elFinder, zip the “security-brief” folder, and use the Share command and send it to the meeting host.
  3. Using a USB stick to sneakernet files is not such a good option, not very popular these days.
  4. He instead connects to the host WiFi network and gives the IP address for his MicroCloud. The host is able to bring up the brief in full resolution and the animated .gif at the end was a big hit.

The briefing was memorable. By using a MicroCloud to brief digital security, he was able to demonstrate sound security practices. He demonstrated HTTPS communications and addressed the security benefits of minimal data distribution.

You see his data was hosted on a device he has full control over, the smartphone in his pocket. His data is not on some nebulous set of computers in the Internet Cloud that he has no control over.

Be secure, encrypt everything.