« First « Previous Comments 20 - 59 of 305 Next » Last » Search these comments
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.
Recent leaks and public records requests have revealed that U.S. law enforcement in Baltimore, Milwaukee, New York, Tacoma, Anaheim, Tucson, and others have used IMSI-catchers extensively in vehicles or aircraft to identify and locate suspects.
These powerful surveillance devices have often been used with little to no judicial oversight. To provide transparency and accountability, we need independent information on who uses them, how often, and when.
SeaGlass sensors collect and upload cell tower signal data to our server where algorithms look for IMSI-catcher signatures.
Main Sensor Parts
Raspberry Pi computer
Cellular modem to scan the cell spectrum
GPS
Bait cellphone
Mobile hotspot to upload data...
To covertly transmit on the same frequencies as the normal cellular network, IMSI-catchers may mimic the identifying properties (mcc, mnc, cell id, etc.) of legitimate cell towers. We expect IMSI-catchers to prefer transmitting strong signals to capture phones and to be some distance away from the towers they may mimic to avoid interference with the real cell tower.
By building a model for each cell tower of how its signals should appear from different positions, we can flag cell tower transmissions that do not match those expected from a legitimate cell tower. This image shows all the measurements of cell ID 7843, where darker colors are stronger signal strengths and larger sizes represent how statistically unlikely the measurement is.
Google employees admit in lawsuit that the company made it nearly impossible for users to keep their location private
Google made it nearly impossible for users to keep their location private, according to newly unredacted court documents.
Even Google execs and employees in charge of location data were confused about how privacy settings worked.
Google was sued by Arizona's attorney general over its data collection practices last year.
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.
So what is the best phone for privacy you can get now? I'm surprised there isn't a company stepping in to fill this void.
Will Verizon, et al, give you a SIM card for that Freedom phone?
Will Verizon, et al, give you a SIM card for that Freedom phone?
It should have hardware kill switches for mic, camera, gps, etc.
Unique IDs linked to phones are supposed to be anonymous. But there’s an entire industry that links them to real people and their address.
Tech companies have repeatedly reassured the public that trackers used to follow smartphone users through apps are anonymous or at least pseudonymous, not directly identifying the person using the phone. But what they don't mention is that an entire overlooked industry exists to purposefully and explicitly shatter that anonymity.
They do this by linking mobile advertising IDs (MAIDs) collected by apps to a person's full name, physical address, and other personal identifiable information (PII). Motherboard confirmed this by posing as a potential customer to a company that offers linking MAIDs to PII.
"If shady data brokers are selling this information, it makes a mockery of advertisers’ claims that the truckloads of data about Americans that they collect and sell is anonymous," Senator Ron Wyden told Motherboard in a statement.
Freedom phone looks promising.
How the FBI Tricked Criminals into Using its Messaging App
Hundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Fortwaynemobile saysFreedom phone looks promising.
As long as it's not just another FBI scam, like their "private" messaging app:
https://www.rollingstone.com/culture/culture-news/fbi-operation-trojan-shield-crime-messaging-app-1181168/How the FBI Tricked Criminals into Using its Messaging App
Hundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Freedom phone looks promising.
Fortwaynemobile saysFreedom phone looks promising.
It's still based on android. And, I'm under the impression that android has a few closed source components. Unless the freedom phone can exclude these parts, google will likely still have their tentacles into your phone. The closed source stuff is likely where the NSA backdoor is.
But, my guess is it will still be somewhat of an improvement on privacy and ability to use apps, at least for now. I would imagine FP can prevent many types of data collection built into the os, but some will be hard to fight. For example, many apps use "push messaging" to save battery and reduce latency on data updates (like, to notify you that you have a new message). Google made it so every android app uses their push messaging server (so the phone only needs to call 1 google server, and that 1 call can get updates for potentially hundreds of apps at the same...
It's still based on android. And
How NSO's Pegasus Is Used to Spy on Journalists
Israeli firm NSO's Pegasus software is used to infect journalists phones in what is called 'zero clicks'. Here's how they did it and what we found out
Revealed: leak uncovers global abuse of cyber-surveillance weapon
Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests ...
Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak.
The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus, which the company insists is only intended for use against criminals and terrorists.
Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.
The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016.
Huge data leak shatters the lie that the innocent need not fear surveillance
The Freedom Phone is made in Communist China and is nothing more than a $120 phone being sold for $500.
Yet another conservative con game
https://www.nydailynews.com/news/national/ny-freedom-phone-made-china-cheap-rebrand-20210716-ye2coq5r5nfthgt4vc4cw2ugby-story.html
“Data privacy” is one of those terms that feels stripped of all emotion. It’s like a flat soda. At least until America’s failures to build even basic data privacy protections carry flesh-and-blood repercussions.
This week, a top official in the Roman Catholic Church’s American hierarchy resigned after a news site said that it had data from his cellphone that appeared to show the administrator using the L.G.B.T.Q. dating app Grindr and regularly going to gay bars. Journalists had access to data on the movements and digital trails of his mobile phone for parts of three years and were able to retrace where he went.
The Freedom Phone is made in Communist China and is nothing more than a $120 phone being sold for $500.
Yet another conservative con game
In short, the phone in your hand exists in a state of perpetual insecurity, open to infection by anyone willing to put money in the hand of this new Insecurity Industry. The entirety of this Industry’s business involves cooking up new kinds of infections that will bypass the very latest digital vaccines—AKA security updates—and then selling them to countries that occupy the red-hot intersection of a Venn Diagram between “desperately craves the tools of oppression” and “sorely lacks the sophistication to produce them domestically.”
An Industry like this, whose sole purpose is the production of vulnerability, should be dismantled. ...
If you want to see change, you need to incentivize change. For example, if you want to see Microsoft have a heart attack, talk about the idea of defining legal liability for bad code in a commercial product. If you want to give Facebook nightmares, talk about the idea of making it legally liable for any and all leaks of our personal records that a jury can be persuaded were unnecessarily collected. Imagine how quickly Mark Zuckerberg would start smashing the delete key.
I worked on the XBox project.
Imagine an Internet of Snitches, each scanning whatever data they have access to for evidence of crime. Beyond the OS itself, individual phone apps could start looking for contraband. Personal computers would follow their lead. Home network file servers could pore through photos, videos and file backups for CSAM and maybe even evidence of copyright infringement. Home routers could scan any unencrypted network traffic. Your voice assistant could use machine learning to decide when yelling in a household crosses the line into abuse. Your printer could analyze the documents and photos you send it.
Your printer could analyze the documents and photos you send it.
richwicks saysI worked on the XBox project.
Fuck that device. Fuck it hard. Apple can take all my shit for all I care, new devices are set up in minutes not hours. I don't game but my kids do, it's the worst platform I've ever encountered. So convoluted and retarded to be honest. I'm no techie, but I've build mediocre websites that worked well for real estate. Xbox (currently) is not intuitive and is a shit show. Maybe it was better when you worked on it, as again I don't play video games.
I worked on the XBox project.
« First « Previous Comments 20 - 59 of 305 Next » Last » Search these comments
Many others have attempted Open Source phones and failed. I hope this one works, especially since I just discovered that you cannot turn off wifi or Bluetooth on Android or iOS. "Turning it off" in the controls on those phones merely disconnects you from current access points, but leaves them on so they can spy on your location with great precision and open you up to various exploits:
https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off