this post was submitted on 16 Jul 2024
310 points (95.3% liked)

Technology

60055 readers
2973 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 12 points 5 months ago (2 children)

stingrays, people.

they sell the exploits and are all hush hush about it.

[–] [email protected] 10 points 5 months ago (1 children)

Stingrays don't do shit for this. That's mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn't get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone's Internet traffic is encrypted from the ISP.

The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

[–] [email protected] 4 points 5 months ago (1 children)

stingrays can compromise a phone through modem exploits, and pull data from there.

though not all of them are made equal, they are an entire category of devices.

[–] [email protected] 3 points 5 months ago

Oh damn, just read about these baseband exploits. Ok, you've changed my mind.

[–] [email protected] 2 points 5 months ago

IMSI catching is a different thing.

But yes, exploits are sold by gray hats rather than by white hats and closed. The NSA is supposed to be on top of this, but instead of closing exploits, they keep them to enhance their anti-terror spying, which they then trickle out to US Law Enforcement, especially if there's loot (liquid assets) that are easy to seize.

Law enforcement in the US is mostly a highway robbery racket.