No it wont be enough because anything being done by the tech giants is probably at least 5 years behind what the FBI/NSA/CIA/DHS has in their toolbox
Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?
Submitted 1 year ago by leo@lemmy.linuxuserspace.show to technology@lemmy.world
Comments
flyoverstate@kbin.social 1 year ago
jet@hackertalks.com 1 year ago
Never going to be enough, use a VPN, and only use end to end encryption for calls…
Or use a VOIP service like google voice for the calls, at least force your monitors to get a warrant to google, make them do some leg work
nbafantest@lemmy.world 1 year ago
None of these will fight a stingray
jet@hackertalks.com 1 year ago
I’m confused. How would this not defeat a stingray? They would know your phone is there. But they wouldn’t see who you’re talking to, they wouldn’t hear your phone call, they wouldn’t see your encrypted messages. They wouldn’t see the traffic on your phone. What’s left?
AProfessional@lemmy.world 1 year ago
Even that isn’t enough. The wireless modules of phones typically have direct access to system memory and, by law, have proprietary firmware. Plenty of exploits have been found over the years. This needs to be isolated to avoid backdoors/bugs.
narc0tic_bird@lemm.ee 1 year ago
Not saying you’re wrong, but I’d love to read the sources to your claims.
jet@hackertalks.com 1 year ago
By law? Which law?
alphapuggle@programming.dev 1 year ago
Disable 2g by default ??? Profit?
I’m not sure what’s so hard about this, I get that 2g goes further for emergencies but it’s basically useless for anything else, have it be enabled if needed (and communicate that with users when first disabling it)
Google Apple and Samsung are all working on / have satellite SOS, which should replace the long term need here