pull down to refresh
0 sats \ 7 replies \ @TonyGiorgio 25 Apr 2023 \ parent \ on: LTESniffer: An open-source LTE downlink/uplink eavesdropper [pdf] tech
This does not protect you from all of the telecommunications snopping or eavesdropping.
Why does it affect phones but not hotspots?
reply
The problem is that the device has a phone number which is often tied to your identity. It also has more telecommunication services turned on than just data download and upload and those services can be abused and also has various privacy vulnerabilities in them.
reply
Oh like phone calls, USSD and SMS?
Carrying a hotspot around sounds very impractical.
The ideal seems to be:
- Nokyc SIM card and/or eSIM (silent.link or airalo) – never give out this number
- Use a separate nokyc number for services that require an activation SMS (whatsapp, signal, etc), if this is a physical SIM card never load it on the same phone as it would leak the IMEI (loosely associated to your ID via the social graph) and tie it to the data SIM
- Never use the phone feature
- Bluetooth always disabled
reply
Definitely an improvement with the above steps. Probably best to rotate sim cards too even if you're doing all of that.
Hot spots can be about the size of a phone so it's just like carrying in your bag or a 2nd phone in your pocket, then you never have that problem.
reply
Why not? they could only get encrypted packets.
reply
Cellular functionalities is different from internet data. See my comment above, but also, as an example: when your phone is about to receive a phone call, it broadcasts publicly to a very long lasting "temporary" ID on the cell towers near your last location. These are public messages that any $50 phone or device can listen to. My research in college was to detect if a victim was home or not given only a phone number and address.
reply
Ah ok. I was thinking LTE for the data/internet part, not the cellular radio.
Also, have a look at "Open Gateway" for more privacy nightmares.
reply