this post was submitted on 24 Oct 2024
403 points (99.3% liked)

Technology

58866 readers
4489 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] magic_smoke@links.hackliberty.org 42 points 1 day ago* (last edited 1 day ago) (8 children)

If you have a device that's actively connected to a cellular network, and has been while in your home or work, then your only option is to leave it behind or turn it off. That includes your car if it was made in the past decade, if nothing else, so it can catch OTA firmware updates, and send telemetry data.

GPS and location services don't mean shit when your carrier keeps logs of where you've been based on cell-tower triangulation.

[–] sunzu2@thebrainbin.org 3 points 1 day ago (5 children)

Do we know how carrier shares cell data?

In another thread, it was suggested thet "cant" just sell it like they isp traffic data for example.

Obviously the state can get it since is logged. Not sure if they would need s warrant tho

[–] turboturtle@lemmy.ca 3 points 15 hours ago (1 children)

This video, where Veritaseum hacks LinusTechTips' phone, gives a good overview of how it's possible to track cellphones or hack sms, even without asking a carrier or having physical access to the device: https://m.youtube.com/watch?v=wVyu7NB7W6Y

TLDW: cellphone networks rely on old, unsecure infrastructure

[–] sunzu2@thebrainbin.org 3 points 15 hours ago

I was talking specifically about how telcos behave within law and corp policy.

But yeah a threat actor with money can do anything if they really care.

load more comments (3 replies)
load more comments (5 replies)