Conversation

Replying to
It's snake oil. The network can't be trusted, whether or not there's local interception. Use encrypted messaging and encrypted calls. If you don't want to be tracked by your carrier and others, you inherently need to turn on airplane mode. Silent SMS is not a real world concern.
1
Replying to and
It simply doesn't matter. Can you explain why these things are a real world issue? You can be tracked by the carrier without sending an SMS. It doesn't matter if it's silent or not, that only controls whether it will be displayed as user-facing. What about that makes it worse?
1
Replying to
I agree 100% with you that the network can't be trusted. I only use signal for communication over ivpn. No other ways. My idea with snoopsnitch was to be informed about targeted surveillance.
1
Replying to and
For example you are a journalist in some shady democracy and they decide to investigate you. Like to get your phone number. If you are with a burner number the telco doesn't have it tied to your name. So when they wan't to track you. They have to use an imsi catcher first
2
Replying to and
if I understand it right. The baseband has knowledge about the 3 towers you are connected too. And it knows the distance. When in your home area a new tower pops up 30 meters away from you. And there is a van sitting in front of your house. You'll get informed about this imsi
2
Replying to
These apps have false positives and I think they cause far more harm than good. I don't see the benefit. Requiring root to be exposed to the application layer rather than having it properly implemented is also completely unacceptable for any serious real world usage.
2
Replying to
of course you are right. It uses heuristic which may fail. But srlabs are studying for a long time mobile networks. They do know what they do. Would there be a way to implement such a app without granting it root? Didn't Fdroid extension also works with root?
1
Replying to
The F-Droid privileged extension is a priv-app bundled into the OS which receives permissions unavailable to regular apps. It exposes that capability to F-Droid, meaning F-Droid can install / upgrade apps without user consent. That has major risks but there's no app level root.
1
Replying to and
As I mentioned, there's no modem debugging in production builds. Turning that on adds substantial attack surface. There's no need to write the code using that at the app layer by exposing root access to it. That's not how things are done in a serious production-oriented approach.
1
Replying to and
Exposing root to the app layer to get access to something is a flawed shortcut for people that are not interested in making secure systems, as it's easier to skip doing things properly via the principle of least privilege and just glue together a bunch of poorly written hacks.
2
Replying to and
The reason people tend to do things via exposing root to apps is because they are not trying to build a secure system, but rather they're just deploying a proof of concept via a hack that destroys the security of the system as a whole. I won't go into all the details about why.
1
Replying to and
Exposing root to the application / UI layer trusts all of that with root access and destroys the security model though. It sets up things for a disaster, especially if it can be dynamically granted, as even temporary control / influence over the UI layer is a local root exploit.
1
Show replies