A series of small cases with a 12 volt auto plug, a small fanless computer, some batteries, and a 3G wireless connection. Hire some vehicle operators to keep it plugged in while they are moving. Once started, they will need a daily activation code to keep operating, otherwise they erase their hard drive encryption key and deactivate, requiring their encryption key to reactivate.
The small cases will constitute a low-powered cloud with no permanent address. If a case is seized in a raid, it becomes inactivated.
Your version of a datahaven seems flawed. What if no-one want to sell you connectivity? How will you manage what adresses they are accassible on? Heck, you even made your data trackable down to a few meters by using GSM.
Granted. I was just thinking of what could be done with off the shelf parts.
I think the scheme can stymie anyone without a wiretapping or a search warrant. Eventually, the law will change to adapt.
How will you manage what addresses they are accessible on?
Steganographic messages posted on darknets over TOR.
Heck, you even made your data trackable down to a few meters by using GSM.
My design goal is to let the authorities eventually shut down the operation, but still deny them any information when they do. I think that's as far as one can practically go with off the shelf hardware.
People talked about things like that after Tunisia and Egypt, for local organizing (maybe combined with SMS, BTS, etc. capability). A lot of the most interesting data is both highly time sensitive (where are police suppressing riots right now) and local (within a few blocks).
I suspect there's a fair bit of USAID, DOD, etc. funding available to make reliable systems like that. It would also be great post natural disaster, some kind of automated repeater and bulletin board system which works with an existing base of smartphones.
A series of small cases with a 12 volt auto plug, a small fanless computer, some batteries, and a 3G wireless connection. Hire some vehicle operators to keep it plugged in while they are moving. Once started, they will need a daily activation code to keep operating, otherwise they erase their hard drive encryption key and deactivate, requiring their encryption key to reactivate.
The small cases will constitute a low-powered cloud with no permanent address. If a case is seized in a raid, it becomes inactivated.