It's not useful in the real world so it makes no sense to include it. Exposing root to the application layer would be a substantial security loss too. It fails to offer any value to make up for that beyond appearing to be useful to people that don't know any better. It isn't.
It's snake oil. The network can't be trusted, whether or not there's local interception. Use encrypted messaging and encrypted calls. If you don't want to be tracked by your carrier and others, you inherently need to turn on airplane mode. Silent SMS is not a real world concern.
It simply doesn't matter. Can you explain why these things are a real world issue? You can be tracked by the carrier without sending an SMS. It doesn't matter if it's silent or not, that only controls whether it will be displayed as user-facing. What about that makes it worse?
I agree 100% with you that the network can't be trusted. I only use signal for communication over ivpn. No other ways. My idea with snoopsnitch was to be informed about targeted surveillance.
For example you are a journalist in some shady democracy and they decide to investigate you. Like to get your phone number. If you are with a burner number the telco doesn't have it tied to your name. So when they wan't to track you. They have to use an imsi catcher first
if I understand it right. The baseband has knowledge about the 3 towers you are connected too. And it knows the distance. When in your home area a new tower pops up 30 meters away from you. And there is a van sitting in front of your house. You'll get informed about this imsi
These apps have false positives and I think they cause far more harm than good. I don't see the benefit. Requiring root to be exposed to the application layer rather than having it properly implemented is also completely unacceptable for any serious real world usage.
of course you are right. It uses heuristic which may fail. But srlabs are studying for a long time mobile networks. They do know what they do. Would there be a way to implement such a app without granting it root? Didn't Fdroid extension also works with root?
The F-Droid privileged extension is a priv-app bundled into the OS which receives permissions unavailable to regular apps. It exposes that capability to F-Droid, meaning F-Droid can install / upgrade apps without user consent. That has major risks but there's no app level root.
As I mentioned, there's no modem debugging in production builds. Turning that on adds substantial attack surface. There's no need to write the code using that at the app layer by exposing root access to it. That's not how things are done in a serious production-oriented approach.
Exposing root to the app layer to get access to something is a flawed shortcut for people that are not interested in making secure systems, as it's easier to skip doing things properly via the principle of least privilege and just glue together a bunch of poorly written hacks.