SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Overview

SecurAID

Overview

SecurAID securely connects aid organizations directly with individuals in dangerous situations to allow them to discreetly and effectively get the assistance they need.

Trusted users, such as members of aid organizations or people working directly on the ground in a humanitarian crisis, have the ability to create secure logins for people they know in dangerous situations. Using these credentials, at-risk people are able to enter into a secure one-on-one internet chat with members from organizations that can best serve their needs.

Through our secure network of trusted organizations and users, SecurAID greatly minimizes the risk of at-risk individuals communicating with non-trustworthy or malicious sources, and also lowers the risk of them being identified by dangerous people or groups. SecurAID solves three key problems at once: eliminating duplicate information, identity verification, and streamlined resource allocation.

Background

Currently there are many disjointed groups of people helping Afghans that they know who are stuck in a dangerous condition. The efforts to help those in need come with many difficulties. Here's a real-world example to explain the problems encountered:

I've deployed to Afghanistan several times and became friends with my interpreters who had my back in combat. I'm now part of a slack group and a Signal chat group that both provide a place to share critical information and to try to allocate resources to our friends overseas. My ultimate goal is to get my interpreter's family out of Afghanistan, but in the meantime their daughter is suffering from kidney issues and the family is low on money. I've filled out numerous forms for visa paperwork, medical assistance, manifesting the family on future flights, and financial aid, but I have no idea what happens to that information once it's submitted, and very few ways to check the status of the requests. In addition, I've submitted forms only to find out another soldier who previously worked with my interpreter also filled out the same forms for his family. This causes extra work for aid workers to sift through duplicte entries. My Afghan family, along with many others, sometimes receive emails saying that they should go to a certain location at a certain time in order to receive help from American aid, however, many of those emails are traps sent by the Taliban to try to find American sympathizers. These families need a way to make sure that the messages they receive are actually coming from the correct sources.

   

How SecurAID works

SecurAID uses a centralized database to store and eliminate duplicate entries, saving valuable time and making it easy to ensure that a family receives the exact assistance they need. The database contains information about assistance type, allowing effective resource allocation by directing aid requests to the appropriate aid organizations. For instance, if a family needs insulin, their category in the database will be set to "medical needs," which will notify medical aid organizations who can access our database, and will ensure that only one organization is filling the request for aid.

To solve the issue of identity verification, the only people who will be able to add an Afghan family to the database will be someone invited into groups similar to the Slack and Signal chats discussed above. In order for a person to be invited to these chat groups, a person needs to be verified and vouched for by someone already in that group. This creates groups of trusted sources who personally know the Afghans they're trying to help. Once the Afghan account is created by the trusted member, that information is added to the database and the appropriate organization is notified of a person to assist overseas. A person at that organization gets assigned to the Afghan in need, allowing them to update the at-risk individual's database entry as more information about their situation comes in. (Individual entries will be read-only for all others who can access the database and are not actively assisting that individual.) From there, the assigned organization contact will send a link to the Afghan family with a link to a secure one-on-one chat room through SecurAID. Whenever important information is sent, it will be sent through the chat room, which means any other forms of communication received through email, text, etc. can be assumed to be nefarious and can be ignored. No one will have access to the unique chatroom except the organization contact and the person receiving assistance. If an overseas ally needs more than one thing (e.g. legal help for passports and heart medication), they will receive multiple links, one from a different contact at each relevant aid organization (e.g. link fomr a legal office, and one from a medical office). At the same time, the trusted source who created the account can see the status of the request and can inform his/her friend of any updates.

Owner
Ty K
Ty K
Course: Information Security with Python

Curso: Segurança da Informação com Python Curso realizado atravès da Plataforma da Digital Innovation One Prof: Bruno Dias Conteúdo: Introdução aos co

Elizeu Barbosa Abreu 1 Nov 28, 2021
SEBUAH TOOLS TERMUX CRACK AKUN FF HOMKI AKUN EPEP DAH SATU FOLLOW AE YA BROO AWOKWOK

print " INSTALL TOOLS " $ pkg update && upgrade $ pkg install python2 $ pkg install git $ pip2 install lolcat $ pip2 install bs4 $ pip2 install reques

Jeeck 2 Nov 29, 2021
Directory Traversal in Afterlogic webmail aurora and pro

CVE-2021-26294 Exploit Directory Traversal in Afterlogic webmail aurora and pro . Description: AfterLogic Aurora and WebMail Pro products with 7.7.9 a

Ashish Kunwar 8 Nov 09, 2022
Scan all java processes on your host to check weather it's affected by log4j2 remote code execution

Log4j2 Vulnerability Local Scanner (CVE-2021-45046) Log4j 漏洞本地检测脚本,扫描主机上所有java进程,检测是否引入了有漏洞的log4j-core jar包,是否可能遭到远程代码执行攻击(CVE-2021-45046)。上传扫描报告到指定的服

86 Dec 09, 2022
automatically crawl every URL and find cross site scripting (XSS)

scancss Fastest tool to find XSS. scancss is a fastest tool to detect Cross Site scripting (XSS) automatically and it's also an intelligent payload ge

Md. Nur habib 30 Sep 24, 2022
Dependency injection in python with autoconfiguration

The base is a DynamicContainer to autoconfigure services using the decorators @services for regular services and @command_handler for using command pattern.

Sergio Gómez 2 Jan 17, 2022
Tools for investigating Log4j CVE-2021-44228

Log4jTools Tools for investigating Log4j CVE-2021-44228 FetchPayload.py (Get java payload from ldap path provided in JNDI lookup). Example command: Re

MalwareTech 91 Dec 29, 2022
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries

A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including P

neeraj 95 Dec 26, 2022
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation).

IDA2Obj IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly from one exe

Mickey 94 Dec 13, 2022
Tool ini berfungsi untuk membuat virus secara instan

vbug (ID) Tool ini berfungsi untuk membuat virus secara instan. Dengan begitu pengguna vbug maker dapat menggunakannya dengan mudah dan cepat. Di dala

OneTXz 3 Jun 05, 2022
Holehe OSINT - Email to Registered Accounts

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

Palenath 3.8k Jan 06, 2023
The Decompressoin tool for Vxworks MINIFS

MINIFS-Decompression The Decompression tool for Vxworks MINIFS filesystem. USAGE python minifs_decompression.py [target_firmware] The example of Mercu

8 Jan 03, 2023
This collection of tools that makes it easy to secure and/or obfuscate messages, files, and data.

Scrambler App This collection of tools that makes it easy to secure and/or obfuscate messages, files, and data. It leverages encryption tools such as

Mystic 2 Aug 31, 2022
BurpSuite Extension: Log4j2 RCE Scanner

Log4j2 RCE Scanner 作者:[email protected]元亨实验室 声明:由于传播、利用本项目所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,项目作者不为此承担任何责

ᴋᴇʏ 87 Dec 29, 2021
the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability

CVE-2021-22005-metasploit the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability pr

Taroballz 25 Nov 15, 2022
Genpyteal - Experiment to rewrite Python into PyTeal using RedBaron

genpyteal Converts Python to PyTeal. Your mileage will vary depending on how muc

Jason Livesay 9 Oct 19, 2022
Laravel RCE (CVE-2021-3129)

CVE-2021-3129 - Laravel RCE About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability. This script allows you to wri

Joshua van der Poll 21 Dec 27, 2022
Growtopia Save.dat Stealer

savedat-stealer Growtopia Save.dat Stealer (Auto Send To Webhook) How To Use After Change Webhook URL Compile script to exe Give to target Done Info C

NumeX 9 May 01, 2022
A Telegram Bot to force users to join a specific channel before sending messages in a group.

Promoter A Telegram Bot to force users to join a specific channel before sending messages in a group. Introduction A Telegram Bot to force users to jo

Mr. Dynamic 1 Jan 27, 2022
Mips script decompiles MIPS assembly instructions & bot functionality

mips mips is a python-based script that decodes MIPS instructions. Usage cd into mips and run python decode.py command or open decode.py to run the sc

Anthony Tedja 0 Mar 30, 2022