trinicorn

joined 9 months ago
[–] trinicorn@hexbear.net 1 points 1 week ago* (last edited 1 week ago)

yeah 100%. IRL organizing for sure more likely to land you in hot water faster ofc. I haven't seen anything federal up close (so far) but I know some of the local anarchist groups totally collapsed after a campaign of infiltration before I was around. But a wellspring of sympathizers/contacts that aren't already on a list seems important to maintain.

[–] trinicorn@hexbear.net 1 points 1 week ago* (last edited 1 week ago) (2 children)

raiding maybe not, but put on a list, via dragnet surveillance?

I guess I should have led the post off with more my opinion lol. Because I'm beginning to think americans should not be accessing the site directly at all. We're all libs, I get that, but when circumstances force us all to start touching more grass I'd rather organize with yall than be sent to the camps together

[–] trinicorn@hexbear.net 1 points 1 week ago

right, but it's a public website on the clearnet, full of marxists. Not taking any precautions to hide that you are a user of the site from your ISP, etc. seems at this point like a bad plan.

[–] trinicorn@hexbear.net 1 points 1 week ago (4 children)

I mean yeah, but is that enough? This server has a static IP, even if they don't know your posts it'd be easy for feds to find people who post here without tor, vpn, etc. and start knocking on doors, making threats, whatever. I'm not sure the old heuristics of what is/isn't safe are sufficient anymore.

[–] trinicorn@hexbear.net 1 points 1 week ago

or built in streaming in mpv if you don't want to download first

[–] trinicorn@hexbear.net 3 points 1 week ago (8 children)

Should USian comrades abandon this site? if not what precautions are appropriate

[–] trinicorn@hexbear.net 6 points 1 week ago* (last edited 1 week ago) (1 children)

I think this is a safe assumption but then what is to be done, for people that already have been in discords that could be flagged as marxist or antifa or whatever? scrub everything and delete your account and hope it gets actually deleted eventually? (and practice better opsec in the future ofc)

 

og post: https://hexbear.net/post/6608284

While it was absolutely spreading unverified accounts that were a bit sus, I think the discussion prompted needs to be had for the USian comrades especially. Feds are watching online spaces, pretexts are already established to treat anti-fascists as terrorists (always have been but it indicates a renewed focus), and the USA cares less about freeze-peach than ever...

What should US comrades be doing to protect themselves, besides "not using discord". What about using this site, what are the risks there?

[–] trinicorn@hexbear.net 2 points 1 week ago

offline devices don't help if they get physically seized, which I believe is cellebrite's specialty, but for things that don't need to be online, yes. as far as the practicality of hand written cipher pads and such, I feel like it should be obvious that they aren't practical in most circumstances, though still a useful back-pocket tool in a pinch at least.

I found the article "Talking to Vula" by someone involved in the development of early ANC encrypted comms interesting on this topic.

[–] trinicorn@hexbear.net 19 points 1 week ago* (last edited 1 week ago) (2 children)

Good news for graphene. They're definitely all over it and not invulnerable but it looks like cellebrite currently can't break into up-to-date graphene devices, even with bootloader unlocked. My takeaway currently is that graphene will help you in the short term but you can't expect it to keep you safe for years after, if it's in evidence or whatever they may gain the ability to unlock it later in the future.

 

cross-posted from: https://lemmy.ml/post/38282920

Someone recently managed to get on a Microsoft Teams call with representatives from phone hacking company Cellebrite, and then leaked a screenshot of the company’s capabilities against many Google Pixel phones, according to a forum post about the leak and 404 Media’s review of the material.

The leak follows others obtained and verified by 404 Media over the last 18 months. Those leaks impacted both Cellebrite and its competitor Grayshift, now owned by Magnet Forensics. Both companies constantly hunt for techniques to unlock phones law enforcement have physical access to.

“You can Teams meeting with them. They tell everything. Still cannot extract esim on Pixel. Ask anything,” a user called rogueFed wrote on the GrapheneOS forum on Wednesday, speaking about what they learned about Cellebrite capabilities. GrapheneOS is a security- and privacy-focused Android-based operating system.

rogueFed then posted two screenshots of the Microsoft Teams call. The first was a Cellebrite Support Matrix, which lays out whether the company’s tech can, or can’t, unlock certain phones and under what conditions. The second screenshot was of a Cellebrite employee. 💡 Do you know anything else about phone unlocking technology? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

According to another of rogueFed’s posts, the meeting took place in October. The meeting appears to have been a sales call. The employee is a “pre sales expert,” according to a profile available online.

The Support Matrix is focused on modern Google Pixel devices, including the Pixel 9 series. The screenshot does not include details on the Pixel 10, which is Google’s latest device. It discusses Cellebrite’s capabilities regarding ‘before first unlock’, or BFU, when a piece of phone unlocking tech tries to open a device before someone has typed in the phone’s passcode for the first time since being turned on. It also shows Cellebrite’s capabilities against after first unlock, or AFU, devices.
Screenshot via GrapheneOS forum.

The Support Matrix also shows Cellebrite’s capabilities against Pixel devices running GrapheneOS, with some differences between phones running that operating system and stock Android. Cellebrite does support, for example, Pixel 9 devices BFU. Meanwhile the screenshot indicates Cellebrite cannot unlock Pixel 9 devices running GrapheneOS BFU.

In a statement, Victor Cooper, senior director of corporate communications and content strategy at Cellebrite, told 404 Media “We do not disclose or publicize the specific capabilities of our technology. This practice is central to our security strategy, as revealing such details could provide potential criminals or malicious actors with an unintended advantage.” Google did not immediately respond to a request for comment.

GrapheneOS is a long running project which makes sizable security changes to an Android device. “GrapheneOS is focused on substance rather than branding and marketing. It doesn't take the typical approach of piling on a bunch of insecure features depending on the adversaries not knowing about them and regressing actual privacy/security. It's a very technical project building privacy and security into the OS rather than including assorted unhelpful frills or bundling subjective third party apps choices,” the project’s website reads.

As well as being used by the privacy and security conscious, criminals also turn to GrapheneOS. After the FBI secretly ran its own backdoored encrypted phone company for criminals, some drug traffickers and the people who sell technology to the underworld shifted to using GrapheneOS devices with Signal installed, according to interviews with phone sellers.

In their forum post, rogueFed wrote that the “meeting focused specific on GrapheneOS bypass capability.”

They added “very fresh info more coming.”

[–] trinicorn@hexbear.net 16 points 1 week ago* (last edited 1 week ago)

Yeah its only getting worse. People need to get tf out of proprietary ecosystems now, android and chrome included, though MS is probably the most egregious at this exact moment

[–] trinicorn@hexbear.net 1 points 1 week ago

ohhh yeah I can imagine. I have avoided clear and not sure about id.me

[–] trinicorn@hexbear.net 5 points 1 week ago* (last edited 1 week ago) (2 children)

honestly the only reason I ever need chromium is for nonstandard things like webserial and bluetooth. What sites don't work with firefox? I'm sure there are some I just don't run into them I guess

64
submitted 5 months ago* (last edited 5 months ago) by trinicorn@hexbear.net to c/chapotraphouse@hexbear.net
 

Robotic clone sickos goes hard ngl but otherwise kinda weak

view more: next ›