73
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 23 Sep 2023
73 points (98.7% liked)
Privacy
31987 readers
345 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
These are kind-of sort-of not really new ways of defeating rogue base stations. Just let the end-users decide if they want to allow any connectivity under 4G or not - that will solve most of these problems.
Basically, phones will connect using the highest-level standard (5G) and encryption standards that it can get a good connection with. Only under very degraded conditions will a phone even think of switching from 5G to 4G or 3G. I'm not sure any new phones. sold in the US at least, support 3G any longer, and 2G should definitely be out.
Kind of outdated at this point, but the lower the standard, the older and generally weaker the communications and encryption protocols are. Thus, if an attacker can degrade the 5G and 4G spectrum enough to make it almost unusable or otherwise advertise massively better quality of service metrics for their imposter station, a mobile device may switch to 3G, and thus use the attacker's base station to pass traffic through. The attacker may be able to break into the 3G packets and get into the internals of your communications easier than something like 4G or 5G.
3g is deprecated and no longer broadcasting. 2g, 4g, and 5g are the only ones in the usa.