Project ideas from Hacker News discussions.

MuMu Player (NetEase) silently runs 17 reconnaissance commands every 30 minutes

📝 Discussion Summary (Click to expand)

1. Distrust of Chinese tech’s data‑harvesting practices

“Unfortunately Mainland tech giants have no sense of user privacy and would like to maximize their profit by collecting every single bit of your data because they don’t profit on selling you the software, they profit on selling your data.” – michaellee8

2. Personal mitigation through sandboxing and isolated environments > “I went with a separate non‑critical phone when I had to communicate on WeChat.” – 8cvor6j844qw_d6

“Shelter apps are installed in a separate work profile, which essentially sandboxes it from the rest of your data…” – Crestwave

3. Geopolitical framing of China‑Taiwan relations

“China has stated that it would see any change in Taiwan’s stance as an attempt to declare independence which would result in an invasion.” – Paradigma11

4. Critique of hyperbolic or one‑sided narratives

“Talking one is evil while dropping off the other is skew of discussion towards vilifying one side and omitting the subject.” – jesterson

These four themes capture the most frequently voiced perspectives in the discussion.


🚀 Project Ideas

IsolatedApp Sandbox Suite

Summary

  • Provides per‑app sandboxing on mobile devices and desktop via containerization that isolates network, storage, and system calls.
  • Eliminates manual permission toggling; users import any Android/iOS package and run it safely.
  • Directly addresses HN concerns about running untrusted Mainland apps without exposing full system data.

Details

Key Value
Target Audience Privacy‑conscious mobile users, developers testing untrusted apps
Core Feature One‑click containerized sandbox for Android/iOS apps with configurable network and file‑system restrictions
Tech Stack Flutter UI, Docker/Termux for Android, macOS sandbox APIs, Rust enforcement layer
Difficulty Medium
Monetization Revenue-ready: Subscription $5/mo

Notes

  • Mirrors frequent HN requests for tools like Shelter and GrapheneOS sandboxing, but extends to any app package.
  • Resonates with discussions about Mainland tech giants harvesting data; this product offers a concrete mitigation.
  • Likely to generate lively debate on privacy tooling and practical security trade‑offs.

ExfilGuard: Network & File Activity Watchdog

Summary

  • Real‑time monitoring of app file accesses and outbound connections; alerts when sensitive artifacts (e.g., ps aux logs) are read or exfiltrated.
  • Offers one‑click block and forensic export for incident response.

Details

Key Value
Target Audience Power users, security auditors, privacy advocates
Core Feature System‑wide watchdog that parses low‑level filesystem events and flags suspicious exfiltration attempts
Tech Stack Go for monitoring, Electron UI, SQLite for event logging
Difficulty High
Monetization Revenue-ready: Tiered subscription $8/mo or $80/yr

Notes

  • Directly responds to HN comments about hidden data collection and storing process listings.
  • Provides concrete audit capability that many users feel is missing from current operating systems.
  • Sparks discussion on personal incident response, regulation, and building transparent monitoring tools.

PrivacyPermission Broker (PPB)

Summary

  • Central dashboard that lets users grant fine‑grained permissions (network only, limited storage, no microphone) to any installed app, persisting across updates.
  • Works on rooted Android and macOS/iOS via enterprise profiles.

Details

Key Value
Target Audience Advanced Android users, privacy engineers, enterprise IT
Core Feature Dynamic permission broker that intercepts grant/revoke calls and enforces least‑privilege policies
Tech Stack React Native front‑end, Linux kernel module (libselinux), gRPC backend
Difficulty High
Monetization Hobby

Notes

  • Addresses HN frustrations about sandboxing on mobile (e.g., brendyn’s GrapheneOS multi‑account approach).
  • Complements existing tools like Shelter by offering more granular, user‑controlled permission overrides.
  • Expected to provoke conversation on permission architecture and feasibility of universal sandbox layers.

BinaryPrivacy Scanner

Summary

  • Static and dynamic analysis tool that scans app binaries (APK, IPA) for hidden data‑collection calls and generates a privacy scorecard.
  • Includes community‑maintained rule set for known Chinese SDK behaviors.

Details

Key Value
Target Audience Developers, security researchers, auditors
Core Feature Automated detection of suspicious API usage (e.g., device‑ID fetch, log‑file reads) with detailed privacy report
Tech Stack Python (Capstone, JADX), React UI
Difficulty Medium
Monetization Revenue-ready: $15 one‑time license for commercial use

Notes

  • Gives HN users a concrete way to verify claims about data harvesting, addressing skepticism toward sources and LLMs.
  • Aligns with discussions on trusting or distrusting Chinese‑origin software and the need for independent verification.
  • Potential to become a community‑driven audit repository, fostering open dialogue on privacy compliance.

Read Later