home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.internet.wireless      Fun with wireless Internet access      55,960 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 55,100 of 55,960   
   Jeff Layman to Andy Burnelli   
   Re: What steps do you perform on your ph   
   08 Nov 22 21:50:32   
   
   XPost: comp.mobile.android, alt.privacy   
   From: Jeff@invalid.invalid   
      
   On 07/11/2022 15:38, Andy Burnelli wrote:   
   > Jeff Layman wrote:   
   >   
   >> Other than what you and others have suggested, the problem is it's an   
   >> unknown moving target.   
   >   
   > Hi Jeff,   
   >   
   > I want to learn whatever I can from people like you and Jeff Liebermann!   
      
   I doubt you'll learn anything from me you don't already know, except   
   perhaps to be overcautious and not use your phone for *anything* where   
   you require even the smallest amount of privacy.   
      
   > Yes. Indeed. You are completely correct. We can only protect against what   
   > we already know to be a threat (usually based on a news article or two).   
   >   
   > Hence I agree with your observation that it's not only a "moving" target,   
   > it's a "growing" target, like snowball rolling down the hill on soft snow.   
   >   
   > That's why, I think, we need each other. You know a lot. I know a lot.   
   > Jeff Liebermann knows a lot.   
   >   
   > Lot's of people know a lot more than any one of us.   
   >   
   >> You noticed your unwanted Google account being created from using Gmail   
   >> on the phone.   
   >   
   > Yes Jeff. I noticed this _only_ accidentally, since all of a sudden I had a   
   > Google Account on my phone. WTF? Where'd that come from, I thought. So I   
   > deleted it. And then it came back. That's when I was able to reproduce why.   
   > (Same with Google Voice, or logging into Google Maps, etc., as I recall).   
   >   
   > Some privacy things we notice because they're overt, such as the SSID_nomap   
   > privacy items, but some aren't obvious - such as the fact Wigle does NOT   
   > respect the _nomap request (AFAIK).   
   >   
   > Then you have to come up with things that are NOT obvious, which is why   
   > a.i.w is involved in this thread, since your SOHO router comes into play   
   > with mobile phone privacy. Allow me to outline, briefly, what that's so...   
   >   
   > a. You know about butterfly hash tables so you set your SOHO SSID unique   
   > b. In addition, you know about _nomap (& _optout_) for Google/Mozilla   
   > c. And you know it's not only your SSID but your unique SSN & GPS location   
   > d. Where SSN in here points out that the _AP MAC is unique_ to you alone   
   > e. And no, as Jeff Liebermann knows, that AP MAC can not easily be spoofed   
   > f. So you dutifully set the (already unique) SOHO SSID to append _nomap   
   > g. You "think" that _nomaop prevents it being "uploaded" to Google/Mozilla   
   > h. But (almost) every Android phone _still_ uploads your SSID to the net!   
   > i. WTF? Then you realize, it's on the Google server the _nomap is respected   
   > j. Worse, you find out that Wigle & NetStumbler maybe don't respect _nomap   
   > k. Now what? You think. You ponder. You google. You search.   
   > l. You come up with an idea after testing how Android handles hidden SSIDs   
   > m. What if you make the SSID _hidden_ (i.e., not broadcast) you ponder?   
   > n. You search a bit more and you find it that maybe that will work   
   > o. If you don't broadcast the SSID, then it's NOT uploaded to the net!   
   > p. At least not for most Android phones that don't have Wigle/Netstumbler   
   > q. But a hidden SSID opens up another privacy can of worms, doesn't it.   
   > r. Now you have to set your phone to _look_ for that hidden SSID   
   > s. That means everywhere you go, your phone _broadcasts_ that hidden SSID   
   > t. Yikes! So you set your phone to NOT re-connect after losing signal   
   > u. While you're at it, you set Android 10+ to a random MAC per SSID   
   > v. On Android 11+ Developer options, you set a random MAC per connection   
   > w. So now, when the connection drops, it doesn't ask to reconnect at home   
   > x. But the benefit is it doesn't broadcast your unique SSID outside home   
   > y. You could have accomplished that task with an automated home geofence   
   > z. But that would necessitate location - which is another can of worms!   
   >   
   > Jeff... I ran out of letters, so I'll stop there... but it goes on,   
   > which is your point and which is mine where, I can't help but logically   
   > and rationally reasonably agree with you that it's hard to protect   
   > against what we don't know about...   
      
   Indeed. This is the Android equivalent of Rumsfeld's "unknown unknowns"!   
      
   > But at least we can protect against what we _do_ know about.   
      
   We can try, but, with a moving target we can't always be sure we'll   
   succeed. What is successful today might not work tomorrow.   
      
   >> More to the point is when it's not obvious what Google is   
   >> doing in the background. And, to be fair, it's not only Google.   
   >   
   > Oh indeed!   
   > Take the case of turning on location (which comes after "z" above)!   
   >   
   > How many people know that when Google Maps turns on "location" it uses its   
   > own Google-specific activity which is different from the "normal" location.   
   > Action = ACTION.MAIN (android.intent.action.MAIN)   
   >   Package Name = com.google.android.gms   
   >   Class Name = com.google.android.gms.location.settings.Locati   
   nAccuracyActivity   
   >   Category = CATEGORY.LAUNCHER (android.intent.category.LAUNCHER)   
   >   
   > Every other method to turn on location does _not_ use that - they use this:   
   >   ACTION: "android.intent.action.MAIN"   
   >   PACKAGE: "com.android.settings"   
   >   CLASS: "com.android.settings.Settings$ScanningSettingsActivity"   
   >   
   > They do different things!   
   > Pop Quiz!   
   >   
   > Guess which one turns on lots more privacy losing stuff, Jeff!   
   > C'mon. Guess!   
   >   
   >   C:\> adb shell am start -n com.google.android.gms/.location.   
   ettings.LocationAccuracyActivity   
   >   
   >> I have a   
   >> Huawei phone which, like many manufacturers, runs a modified version of   
   >> Android (particularly so with Chinese phones after their disagreement   
   >> with Google). So what is /that/ version doing in the background? It   
   >> might be different from what Google Android is doing. Let's not forget   
   >> that the hardware is supplied by Huawei too; any "backdoors" in those   
   >> chips? And then, of course, you have the cellphone signal provider.   
   >> Everything goes through them, so if it's unencrypted...   
   >   
   > Yup. We need debugging information.   
   > We can use adb for "some" of that, but the problem I have with adb is that   
   > I don't understand yet how best to cull the output into something usable.   
   >   
   >   C:\> adb shell am start -n com.google.android.gms/.gcm.GcmDiagnostics   
   >        (take a look at the mtalk.google.com traffic, for example)   
   >   
   >> As it's possible to have more than one Google account associated with a   
   >> single cellphone, perhaps jumping between accounts when using the phone   
   >> might cause some confusion at Google HQ (although I'm sure they can work   
   >> their way round that).   
   >   
   > Hmmmmm...... I never thought of having even one account, let alone multiple   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca