TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Spying on a smartphone remotely by the authorities: feasibility and operation

117 pointsby joebiden2almost 2 years ago

15 comments

zozbot234almost 2 years ago
This answer is dangerously naïve. Phone basebands and radios are full of vulnerabilities, if you don't want your phone to be a potential surveillance device given any minimally sophisticated adversary you should either turn off the radio or preferably shut it off entirely and remove the battery.
评论 #36645228 未加载
评论 #36648311 未加载
bambaxalmost 2 years ago
A little OT but strongly related: in France you can go to prison if you refuse to give your phone&#x27;s password to the police (nothing like a &quot;free country&quot;, I guess).<p>Is there a way to set up a phone so that typing a &quot;special&quot; password puts the phone in an alternate state with different apps and content, etc. (and possibly erase the regular content)?
评论 #36646208 未加载
评论 #36646199 未加载
user6723almost 2 years ago
Google Play is a rootkit. Google will fully cooperate with any government. If you use GrapheneOS on a pixel device your bootloader is closed source and the system-on-chip is largely undocumented and impossible to audit without serious resources. So yeah. Shit&#x27;s fucked man.
评论 #36647941 未加载
评论 #36668835 未加载
GeekyBearalmost 2 years ago
Can the thing France just made legal be done?<p>&gt; French police should be able to spy on suspects by remotely activating the camera, microphone and GPS of their phones and other devices, lawmakers agreed late on Wednesday, July 5.<p><a href="https:&#x2F;&#x2F;www.lemonde.fr&#x2F;en&#x2F;france&#x2F;article&#x2F;2023&#x2F;07&#x2F;06&#x2F;france-set-to-allow-police-to-spy-through-phones_6044269_7.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.lemonde.fr&#x2F;en&#x2F;france&#x2F;article&#x2F;2023&#x2F;07&#x2F;06&#x2F;france-s...</a><p>Why would anyone stir up the civil libertarians if the thing you are making legal is not possible?
评论 #36645447 未加载
评论 #36646777 未加载
qupalmost 2 years ago
Is there some kind of vote bot ring or something?<p>This is a question with one short answer (at the time of my comment). It&#x27;s hard to imagine why it made the top on its own merits.
评论 #36645944 未加载
评论 #36645168 未加载
评论 #36645094 未加载
评论 #36645160 未加载
erealquestionisalmost 2 years ago
To me the real question is. Technical feasibility aside.<p>Would the cell phone manufacturers (Apple, Samsung, Motorola, Nokia, Xiaomi, etc) say no when faced with the possibility of losing market share in France. Because of a law pushed through under the cover of security. Many a liberties have slipped under that blanket cover called security.<p>I think they will put in this feature if it&#x27;s not already there.
评论 #36647397 未加载
评论 #36646825 未加载
评论 #36647377 未加载
l8_to_catch_upalmost 2 years ago
I know for a fact that my electronics (including smartphone) is being monitored (including this post) by my government.<p>That probably doesn&#x27;t surprise others. What isn&#x27;t as known is that the government also intrudes into chats with other people on social media.<p>They don&#x27;t just monitor, but actively interfere.<p>Edit: By the way, Nokias and other dumbphones (without physical off-switches -- the PinePhone has them, but good luck getting one) can also get their mic and GPS remotely activated. The partial solution is to get one with a removable battery and remove the battery whenever not in use.<p>iPhones can be hacked into through IMEI if you connect them, but are useful, encrypted offline-only PDAs if you don&#x27;t install any app.<p>Also, if your electronics are being spied on by the government to this degree, chances are you are also being physically monitored.
评论 #36646800 未加载
godelskialmost 2 years ago
IANAL nor French, but reading the article, is this just saying that French police can get a warrant, issued by a judge, that allows them to tap a suspect&#x27;s device (not longer than 6 months)? I just want to make sure I got the facts right.<p><a href="https:&#x2F;&#x2F;www.lemonde.fr&#x2F;en&#x2F;france&#x2F;article&#x2F;2023&#x2F;07&#x2F;06&#x2F;france-set-to-allow-police-to-spy-through-phones_6044269_7.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.lemonde.fr&#x2F;en&#x2F;france&#x2F;article&#x2F;2023&#x2F;07&#x2F;06&#x2F;france-s...</a>
评论 #36648975 未加载
ofslidingfeetalmost 2 years ago
We already know for a fact that they can surveil virtually all smart devices including appliances and televisions due to the Vault 7 leaks, and this would tend to be corroborated by the national geospatial intelligence agency telling congress that they have a high resolution 3d map of the entire globe&#x27;s events at any given time.
评论 #36645519 未加载
alexawarrioralmost 2 years ago
Any broadband chip since 3G ships with proprietary drivers which have backdoors. I tried to build an open phone, worked for one of the major telcos, and could never get around the driver issue in trying to make an open phone.<p>BUT sophisticated attackers like US or Israeli governments (and I assume Russian or Chinese but I don’t have direct experience with these) don’t need these backdoors, getting anywhere near your phone is enough to root it to allow installation of spyware, according to my CSO who worked in naval intelligence. There are simply too many vulnerabilities for there to be a hardened device in the consumer space. Some are better than others (Apple) but as Bruce Schneier says, if you are worried about this sort of thing you really have to be totally disconnected from the internet and exchange encrypted physical media.
评论 #36645793 未加载
collected_thotalmost 2 years ago
To add to this discussion, I must note what I don&#x27;t see many mentioning here.<p>One doesn&#x27;t need to do any shady stuff with baseband or stockpile on zero day vulns.<p>The current mobile ecosystem is such that any supported device (recieving updates and such) sends its unique identifier to the manufacturer before recieving OTA updates. And devices by default check for updates on a regular bases. Basically the manufacturer can always target and track individual devices. And provision indivisualised signed updates. Not just at the country level but targeted to specific IMEI.<p>Coming to more concrete examples, Google is known to do AB testing with their Pixel line of devices, setting custom profiles for some users.<p>Xiomi had previously shown capability to actively disable devices that move outside of legal sale regions.<p>Samsung uses such capabilities for enterprise devices in Samsung&#x27;s Enterprise&#x2F;Knox platform. And consumer devices can be thought of as enterprise devices under the manufacturers domain.<p>---<p>So the government only simply needs to send these companies warrants to target, bug and track specific devices or registered customers.<p>Online platforms are already subjected to data requests from law enforcement which they must conform to (atleast those with supporting warrant).<p>Some try to recuse themselves from such compelled intrusion of their customers by employing end to end encryption (e2ee).<p>With this provision and manufacturer cooperation, they could get direct full control of the ends (personal devices). Obviating the need to &quot;break&quot; encryption.<p>Why deal with a dizzying cloud of services in wide range of jurisdictions when you can have full access to citizen devices with cooperation of a handful of manufacturers.<p>In summary, this is not just feasible, the elements for an organised remote control system are already present in current smartphone ecosystem. In form of signed updates by manufacturers that can target particular IMEI devices. One just needs this law to wade through the legality issues.<p>A solution to avoid such sweeping surveillance capability would be to convince manufacturers to not receive identifiable data before provisioning updates. And have a public ledger of officially signed image hashes, like those of of domain certificate transparency lists.
vxxzyalmost 2 years ago
This question has been in my head recently. How feasible is it really? The answer in the link isn’t comprehensive. Is it really out of the question for manufacturer’s to ship a particular version of a device and software for a target country? Nation states have a history of backdooring or weakening particular technologies.
评论 #36645192 未加载
评论 #36647569 未加载
rolphalmost 2 years ago
nuggets to supplement discussion<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Baseband_processor" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Baseband_processor</a>
numpad0almost 2 years ago
What&#x27;s the path of least resistance to find RCE on baseband?
RecycledElealmost 2 years ago
The vulnerabilities are built in at every level.<p>Source: I was once a CALEA programmer.<p>Anyone who says otherwise is an idiot, a liar, or both.<p>Web sites that are frequently referenced are forced to censor the truth.