this post was submitted on 16 Sep 2023
104 points (99.1% liked)
Technology
59438 readers
3303 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Never going to be enough, use a VPN, and only use end to end encryption for calls...
Or use a VOIP service like google voice for the calls, at least force your monitors to get a warrant to google, make them do some leg work
None of these will fight a stingray
I'm confused. How would this not defeat a stingray? They would know your phone is there. But they wouldn't see who you're talking to, they wouldn't hear your phone call, they wouldn't see your encrypted messages. They wouldn't see the traffic on your phone. What's left?
Your IMEI, your carrier IP, your packet timing, any DNS your phone leaks, the IP of your VPN endpoint, your transmitter chipset, your likely OS kernel, any unreleased zero-days known to them (and maybe an exploit for them), and also a way to ack TCP packets it never intends to forward in order to sever your connection while letting your device keep taking for as long as possible, which might buy them a little extra time before you realize they’ve captured your session and cut you off.
Everything you said is true, but that is a reduced surface area versus the scenario where you're sending your traffic naked over the wire. Including your voice traffic. Using a VPN while attached to a stingray is strictly a smaller risk surface.
They don't care about the data. They want the metadata. That's the whole point of these things
Even that isn’t enough. The wireless modules of normal phones have direct access to system memory and, by law, have proprietary firmware. Some exploits have been found over the years. This needs to be isolated to avoid backdoors/bugs.
Not saying you're wrong, but I'd love to read the sources to your claims.
Example: https://grapheneos.org/faq#baseband-isolation
Baseband modems were not isolated from kernel memory in stock Android, GrapheneOS had to do it themselves using the IOMMU. We do not know for sure due to the proprietary/closed-source nature of baseband modem drivers, but we have no reason to assume any OEM (Samsung, Xiaomi etc) implemented proper isolation of baseband modem and system memory.
That'd be a huge oversight on their part. Thanks for the clarification.
By law? Which law?