![]() You like anonymizing networks, but you know the caveats of traffic tunneling and didn't connect from your home router. You like virtualization, but you keep some crucial data and keys(treams) on a un-networked machine. You like to talk to people, but you know that a long-term pseudonym is the gravest danger of them all. That is, if you are serious you will put in multiple safety nets at every layer of the stack so that "one slip" is not enough. Imagine you were a mad scientist testing out a jetpack- you are confident yes? But I imagine you would feel more confident with a bunch of nets, and a trampoline underneath that, and a lightning rod in case of a storm, and a requirement that you hold down multiple buttons at once to play with the controls, etc. > can just wait for you to make a mistake.Īnyhow, if one slip-up is enough, you're doing it wrong. I know the spot on my commute home where I switch my settings. ![]() ![]() This takes some discipline at first but then just becomes habit. This allows using the device as a Wi-Fi only device." Enabling airplane mode disables the cellular radio, but Wi-Fi can be re-enabled and used without activating the cellular radio again. The baseband implements other functionality such as Wi-Fi and GPS functionality, but each of these components is separately sandboxed on the baseband and independent of each other. Activating airplane mode will fully disable the cellular radio transmit and receive capabilities, which will prevent your phone from being reached from the cellular network and stop your carrier (and anyone impersonating them to you) from tracking the device via the cellular radio. "Connecting to your carrier's network inherently depends on you identifying yourself to it and anyone able to obtain administrative access. And that's as simple as looking up the SIM purchase / use. Details about your phone are well recorded (MAC, SID, etc)Īnd always remember, your phone can be implicated based on location data, which will implicate you once it's discovered you own the phone. And de-anonymization of VPN connections to identify downstream connections are possible, IIRC. Nothing really does a good job of hiding the fact that you are connected to a VPN except TOR, and where that connection originates (e.g., your wifi network, which is well Geo-located, remember?). VPNs hide the content of connections, at least from MITM / eavesdroppers, but server-side data scrapes are quite effective at figuring out who you are (or what your phone is. Your shopping / outings? Forget it, fully known. All your home wifi connections are well Geo-located, thanks to other Android users picking up the ESSID as they walk / ride / drive past your house. ![]() Tower associations can still happen with data "off", since there's plenty of "listen" components. No user-controlled software change like updates. It seems to be because of the SIM the phone uses and the network it connects to. The carrier seems to be able to remotely change these settings (see the referenced Reddit post as well), which I would never expect. They are about controlling whether to and which alerts one wants to receive on their phone. The settings I am referring to are under "Apps & notifications"/"Wireless emergency alerts". I also couldn't find any mention of this particular power of carriers apart from one lonely Reddit post about someone trying to turn off Amber alerts. I must say I strongly dislike losing control over my own device. (3) How do you feel about this type of remote control by a third party? (2) Any strategies to keep something like this from happening besides rooting the device? (1) Were you aware that carriers can remotely override your settings like this? Apparently, the local carrier she uses turns them back on remotely. My wife is currently in Germany and had cell broadcast warnings disabled on her Android 11 device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |