You are viewing a single comment's thread from:

RE: Cellebrite Can "Hack Any Device" with UFED Extraction Technology | DD18 The Wikileaks Archive

in Deep Dives5 years ago (edited)

I remember when researching the blackphone and that even though it's so privacy-centric, it's still not very private at all because:

"As we’ve covered before, your phone’s baseband — the device that handles negotiation with cell towers and other messy stuff — is essentially a black box, with its own CPU and operating system. The baseband has complete, low-level access to your microphone — access that the Blackphone cannot mitigate against. If the NSA really wants to tap your phone, that is probably the attack vector that it would use." — source

Between something like that, the keyloggers, and the various permissions that all the apps require, I've given up the idea that anything done on cellphones can be done privately and it's probably just as bad with computers too. Most, any-and-all privacy, is illusory at best.

You'll get a series of dark patterns to keep you under the illusion that your data is yours and private, but it's simply not true in most cases. If you want privacy on a cellphone; cut out the microphone and camera, remove the battery, chuck it inside of a Faraday bag. Gently place said bag in a microwave, and then throw that off the nearest cliff.

Sort:  

LOL, great advice!
Good to see that many protestors are leaving their phones at home.

I wasn't able to fit it into this article but I do believe that UFEDs mainly use exploits inside some of the most popular apps in order to bypass security.