285
top 37 comments
sorted by: hot top controversial new old
[-] djsoren19@lemmy.blahaj.zone 3 points 5 hours ago

This is exactly why I was railing against some of the earlier protests which featured politicians openly asking protestors to take out their phones and send texts to opt-in for fundraisers. Besides all the obvious bullshit, it put those protestors who didn't know better at serious risk.

Thankfully, I haven't seen too much of that at the protests I've been to recently, but this is a good reminder that we have to keep educating people to leave their phone at home.

[-] RampantParanoia2365@lemmy.world 1 points 5 hours ago

I like how the image clearly shows a blue sky for this very expected and foreseeable headline.

[-] SocialMediaRefugee@lemmy.ml 5 points 9 hours ago

Pass paper notes

[-] tired_n_bored@lemmy.world 34 points 16 hours ago

At protests you should not bring your smartphone but instead rely on anonymous drvices such as Meshtastic.

If you want to bring your smartphone to a protest, set Airplane mode and communicate with others through Bluetooth or WiFi networks using Briar or Bitchat

[-] skuzz@discuss.tchncs.de 8 points 11 hours ago

Bluetooth and WiFi can be tracked as well, even with "anonymized" WiFi MAC addresses.

[-] tired_n_bored@lemmy.world 5 points 11 hours ago* (last edited 11 hours ago)

May I ask you how? Or if you have more info? No criticism here, honest question. Afaik the only way to do that would be to fingerprint a behavioural pattern, which albeit possible is surely more secure than cell communication.

[-] lemming741@lemmy.world 4 points 8 hours ago

The "find my" networks still function with randomized macs and "fully" powered down devices

[-] mesamunefire@piefed.social 6 points 13 hours ago

Meshtastic with 3 jumps would be stretching for actual communication. Plus Bluetooth is even worse for security. Direct connection might be a better way to use the device.

I've had meshtastic for about 2 ish years now and its still being worked on.

[-] tired_n_bored@lemmy.world 4 points 12 hours ago* (last edited 12 hours ago)

What is unsafe about cell communication is that there is virtually no way to prevent being tracked. Bluetooth is not necessarily more secure but has several advantages:

  1. Its Mac address can be easily changed. With a fake Mac address it's more difficult to track someone down, albeit it needs some "technical skills" (going in the developer settings)
  2. With these apps communication is encrypted by default unlike cell tower communication
  3. The range is limited. If police listens over Bluetooth they'll be able to track less people down
[-] folaht@lemmy.ml 5 points 14 hours ago* (last edited 14 hours ago)

It's amazing how many times I saw this knowledge being spread, together with thousands of umbrellas and hard hats during the Hong Kong riots from day one with "Hong Kong, add oil" as their first slogan combined with very mild mannered arguments (we don't know if it could lead to more serious things) against the extradition law which was supposed to affect maybe half a dozen people per decade, all serious criminals. A law almost every country has on earth that the US used against the daughter of the owner of one of the largest companies in the world, for the flimsiest of reasons, in contrast to the walled-off-to-arrest-one-particular-teen-girl-axe-murderer-to-be-shipped-to-Taiwan-law Hong Kong tried to implement.

How many people have been affected by the Alien Enemies Act again?

And how did the ~~The protests were call "No kings" remember that? Remember that it was called NO KINGS "Unbiased. Straight. Facts" SAN? Do you remember that? No? Okay, well...~~ "anti-ICE" ~~it is~~ protests go?

Because apart from the shocker that you were being surveilled, I think the protests needed a little bit less "Zero demands, not one more" chants and a little more 'We demand and protest until we win and get what we want' kind of thing.

[-] Maeve@kbin.earth 5 points 16 hours ago

Isn't Bluetooth easy to intercept?

[-] mesamunefire@piefed.social 6 points 13 hours ago* (last edited 13 hours ago)

Super easy. You can also do basic triangulation with some specialty hardware.

[-] tired_n_bored@lemmy.world 2 points 12 hours ago* (last edited 12 hours ago)

But we're talking about a protest where bad actors (the police) just want the names of its attendants. Our phones scream to everyone "I am [name surname] and I am here!". Bluetooth instead says the same but with a lower tone of voice, so less people can listen. Also, with little configuration you can instruct it not to broadcast its identifier.

[-] lepinkainen@lemmy.world 13 points 15 hours ago

Not at the same scale as mobile traffic

Bluetooth by definition doesn’t go much past 10-20 meters

[-] ArchmageAzor@lemmy.world 22 points 17 hours ago

Yeah, if you go protest you should leave your tracking device at home or, even better, with a friend or relative who you know will not be there. The US government doesn't require subcutaneous tracking chips (yet), you can put yours away.

[-] seathru@lemmy.sdf.org 49 points 1 day ago

You can help

I flashed a $10 orbic to take to local protests.

[-] tehmics@lemmy.world 14 points 17 hours ago
[-] Nalivai@discuss.tchncs.de 30 points 16 hours ago

Cops use devices to pretend to be a celltower, so your phone connects to it, and then they use it to spy on you. Rayhunter looks for this behaviour and warns you if it detects a suspicious tower that behaves like cops pretending to be a tower.

[-] egrets@lemmy.world 7 points 16 hours ago

What do you do if it comes up positive? Presumably if you know it's a risk, you'd leave your phone in airplane mode or at home, and if you know it's happening you've already been recorded?

[-] seathru@lemmy.sdf.org 11 points 13 hours ago

At the moment, about all you can do is let others know and submit the log to EFF so they can better understand how these stingrays are being used.

Or I guess if you're feeling froggy; look around for a van/trailer with suspicious antenna(s).

[-] sem@lemmy.blahaj.zone 7 points 13 hours ago
[-] whostosay@lemmy.world 2 points 9 hours ago

Sometimes you just gotta draxlum sclountszts

[-] Glitterbomb@lemmy.world 15 points 15 hours ago

You triangulate the signal and pass the coordinates to artillery teams.

[-] plz1@lemmy.world 21 points 23 hours ago

I don't understand why cell phones don't authenticate the towers they connect to. Is this really just a "standards lag behind modern security" thing, or is it on purpose to allow these Stingray devices to be used?

[-] eleitl@lemmy.zip 2 points 11 hours ago

IMEI/IMSI are collected (and immediately linked, hence deanonymized even if SIM was inserted only once) by cell tower operators. Just not bring your device, period.

[-] plz1@lemmy.world 1 points 10 hours ago

Yeah, I agree with that personally, but realistically, "your phone was near a place" is not the same as "you were involved". If they hijack a phone onto a Stingray, they can get way more info than just IMEI.

[-] user224@lemmy.sdf.org 6 points 15 hours ago

I don't know the specific methods, but 3G, 4G and 5G do authenticate bidirectionaly, just 2G doesn't, partially why Android now has "Disable 2G" toggle.
Also probably why they said they can downgrade you to 2G to intercept communication.

What's happening here is probably similar to anyone being able to send Wi-Fi deauthentification frame to your device to disconnect you. Unless you're using WPA3.

[-] einkorn@feddit.org 15 points 20 hours ago

I assume it's the same as the Internet (or more specifically HTTP): It wasn't designed with security in mind.

Unlike HTTP, for some reason it wasn't included in a new specification, though. My guess is that's because of the more centralized nature of cellular networks. The barrier for entry is a lot higher as well so there are few but big players who have little incentive to improve over the bare minimum.

IIRC encryption was initially proposed to be part of 5G but got shot down in the process.

[-] theshatterstone54@feddit.uk 4 points 17 hours ago* (last edited 17 hours ago)

Wait, 5G isn't encrypted? I think it does have some protections still. I mean, not that it would matter to me, they only use NR-NSA in my country so it isn't even full 5G with all its advantages.

At the risk of sounding like an AI-generated ad, I use an app called Privacy Cell on Fdroid, that confirmed there is no true 5G anywhere in my country. I just wish there was a way to differentiate between the two versions of 5G natively, kinda like 4G-LTE showing up as LTE instead of just 4G.

[-] mkwt@lemmy.world 3 points 13 hours ago

Encrypted data channels can still be vulnerable to man in the middle attacks. Like when you connect to an unknown host with SSH, and the client pops up a big warning.

In this case, ICE or whomever sets up a "valid" cell tower that your phone connects to, and they (law enforcement) route your packets onto the rest of the Internet. They can decrypt the 5G data, and see all of the IP headers. They can't necessarily read the TLS traffic, such as https. But most important of all, they can log all of the IMEIs that connect, which effectively gives them a database of all of the protestors.

[-] utopiah@lemmy.ml 6 points 17 hours ago* (last edited 17 hours ago)

why cell phones don’t authenticate the towers they connect to.

I believe it's because they assume it's not necessary because it was until now

  • prohibitively expensive, but now a "tower" is less than 2k EUR e.g. https://www.crowdsupply.com/ukama/ukama
  • prohibitively complex, see above, namely you don't need to be a TelCo engineer to get it going
  • probably illegal, namely you needed (and I bet still need in most places) wireless band allocation before you could deploy anything

... so I imagine there was no authentication because there was no practical threat beside so "fun" examples in CCC or DEF Con.

[-] mkwt@lemmy.world 3 points 13 hours ago

The use of Stingray by US law enforcement has been challenged on grounds that the law enforcement agencies have no spectrum license. Those challenges seem not to have found success.

On the other hand, prisons in the US have been stopped from operating cell phone jammers on prison grounds, on the same complaint of no spectrum license.

[-] lauha@lemmy.world 7 points 20 hours ago

Even if they did, I don't see government having trouble getting a proper authentication key.

[-] fluffykittycat@slrpnk.net 4 points 23 hours ago

I assume on purpose

[-] adespoton@lemmy.ca 9 points 23 hours ago

Those circumstances include immediate threats to national security and situations where a person is in danger of death or serious injury.

Well I see a problem there. It doesn’t specify the cause of the danger or the reason the person is in danger in the first place.

[-] meyotch@slrpnk.net 4 points 15 hours ago

We are always at war with Eurasia

[-] adespoton@lemmy.ca 9 points 23 hours ago

EFF missed a fun opportunity to call the Rayhunter “DeCSS”.

this post was submitted on 10 Jul 2025
285 points (98.6% liked)

Technology

38883 readers
477 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 6 years ago
MODERATORS