No it wont be enough because anything being done by the tech giants is probably at least 5 years behind what the FBI/NSA/CIA/DHS has in their toolbox
Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?
Submitted 9 months ago by leo@lemmy.linuxuserspace.show to technology@lemmy.world
Comments
flyoverstate@kbin.social 9 months ago
jet@hackertalks.com 9 months ago
Never going to be enough, use a VPN, and only use end to end encryption for calls…
Or use a VOIP service like google voice for the calls, at least force your monitors to get a warrant to google, make them do some leg work
nbafantest@lemmy.world 9 months ago
None of these will fight a stingray
jet@hackertalks.com 9 months ago
I’m confused. How would this not defeat a stingray? They would know your phone is there. But they wouldn’t see who you’re talking to, they wouldn’t hear your phone call, they wouldn’t see your encrypted messages. They wouldn’t see the traffic on your phone. What’s left?
AProfessional@lemmy.world 9 months ago
Even that isn’t enough. The wireless modules of phones typically have direct access to system memory and, by law, have proprietary firmware. Plenty of exploits have been found over the years. This needs to be isolated to avoid backdoors/bugs.
narc0tic_bird@lemm.ee 9 months ago
Not saying you’re wrong, but I’d love to read the sources to your claims.
jet@hackertalks.com 9 months ago
By law? Which law?
alphapuggle@programming.dev 9 months ago
Disable 2g by default ??? Profit?
I’m not sure what’s so hard about this, I get that 2g goes further for emergencies but it’s basically useless for anything else, have it be enabled if needed (and communicate that with users when first disabling it)
Google Apple and Samsung are all working on / have satellite SOS, which should replace the long term need here