NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
Twelve Million Phones, One Dataset, Zero Privacy

Every minute of every day, everywhere on the planet, dozens of companies — largely unregulated, little scrutinized — are #logging the #movements of tens of millions of #people with #mobile #phones and storing the information in gigantic #data #files. The Times #Privacy #Project obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles.

Each piece of #information in this file represents the precise location of a single #smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers.

After spending months sifting through the data, tracking the movements of people across the country and speaking with dozens of data companies, technologists, lawyers and academics who study this field, we feel the same sense of alarm. In the cities that the data file covers, it tracks people from nearly every neighborhood and block, whether they live in mobile homes in Alexandria, Va., or luxury towers in Manhattan.

One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices’ owners to the residences indefinitely.

If you lived in one of the cities the #dataset covers and use #apps that share your# location — anything from weather apps to local news apps to coupon savers — you could be in there, too.

If you could see the full trove, you might never use your phone the same way again.

Read more:
https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html

#surveillance #privacy #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
PinePhone Braveheart Linux smartphone begins shipping January 17th

The PinePhone is an inexpensive smartphone designed to run Linux-based operating systems. Developed by the folks at Pine64, the $150 smartphone was first announced about a year ago — and this week the first units will ship.

https://www.pine64.org/2020/01/15/pinephones-start-shipping-all-you-want-to-know


#pinephone #mobile #phone #alternatives
What Does 1GB of Mobile Data Cost in Every Country?

Billions of people around the world rely on their mobile phones every day.

Even in a saturated market, mobile networks have continued to expand their reach. In the last five years alone, almost one billion additional people have gained access to mobile data services.

Despite the growing prevalence of these networks worldwide, the cost of gaining access can vary greatly from country to country—particularly when it comes to the price of mobile data.

Today’s chart uses figures from Cable.co.uk to showcase the average cost of one gigabyte (GB) of mobile data in 155 different countries and jurisdictions. Despite the vast global reach of the mobile economy, it’s clear it still has a long way to go to reach true accessibility.

https://www.visualcapitalist.com/cost-of-mobile-data-worldwide/

#internet #mobile #datacap #datacaps
Mobian Project Wants to Bring Debian GNU/Linux to Mobile Devices

Meet Mobian, a new Open Source project that aims to bring the powerful and very popular Debian GNU/Linux operating system to mobile devices.

If you thought for a second that the Linux phone market lacks operating systems you can try, think again as developers are just getting started. After postmarketOS announcing their PinePhone Community Edition, now there’s a new project called Mobian, which promises to bring Debian to Linux phones.

That’s right, you can now install and use a pure Debian GNU/Linux operating system on your PinePhone. Mobian helps you do that by integrating the standard Debian GNU/Linux packages with the GNOME-based Phosh (Phone Shell) user interface developed by Purism for their Librem 5 phone.

https://9to5linux.com/mobian-project-wants-to-bring-debian-gnu-linux-to-mobile-devices

#linux #debian #mobile #mobian
NSW mobile detection 'loophole' generating millions of dollars

Almost one in 10 motorists caught by NSW mobile phone detection cameras are using companies to avoid the penalty in what the state's opposition is describing as a loophole that's keeping dangerous drivers on the roads.

More than $19 million was generated from the new cameras between March and June this year, Revenue NSW statistics reveal, with about 43,000 fines issued. Eight per cent of those were linked to businesses that said they could not confirm who was driving.

https://www.smh.com.au/national/nsw/nsw-mobile-detection-loophole-generating-millions-20200803-p55i4z.html

#australia #mobile #surveillance
Media is too big
VIEW IN TELEGRAM
Betrusted

https://betrusted.io

A prototype security-foccussed open-software/hardware device (akin to a PDA) for delegating your sensitive information and tasks to. It has a microkernel and userspace in rust and the development version uses a reconfigurable FPGA instead of a CPU.

Betrusted is a secure and private communications system. It gives users an evidence-based reason to believe that private matters are kept private.

Betrusted is more than just an app, and more than just a gadget – it is a co-designed hardware + software solution that provides safe defaults for everyday users. It’s also open source, empowering advanced users to analyze, extend and explore this secure
mobile computer.


#betrusted #mobile #phone #alternatives
Bing mobile apps suffered a data leak, leaking 6.5TB of search data

Microsoft’s Bing mobile apps, available on Android and iOS, have been the victim of a data leak. Security researchers found an Elastic server that had its password protection removed, reportedly as a “misconfiguration” of the server, which has resulted in 6.5TB of search data being made available publicly on the internet, which grew by up to 200GB per day.

Security researchers from WizCase found the unprotected server on September 12, although the authentication is estimated to have been removed 2 days prior. After discovering the data was coming from Bing’s mobile apps, by performing a search themselves and seeing it appear in the data, the researchers contacted Microsoft on September 13, and the information was given to Microsoft’s Security Response Centre, who acted to resolve the problem a few days later.

The data leak has exposed a trove of data that Microsoft collects from users who use the Bing mobile apps. The data included:

Search terms (excluding any searches in ‘private’ mode)

GPS coordinates (if location permissions are enabled, with a ~500 metre accuracy)

Date and time of the search

Firebase notification tokens

Coupon data

Partial list of the URLs visited by the user from the search results

Device model

Operating system

3 unique identifiers, including:
⭕️ ADID: possibly an identifier for a Microsoft Account
⭕️ deviceID
⭕️ devicehash

None of the data was encrypted.

https://www.onmsft.com/news/microsoft-bing-data-leak

#Microsoft #Bing #mobile #app #dataleaks
Revealed: China suspected of spying on Americans via Caribbean phone networks

Security expert claims Chinese surveillance may have affected tens of thousands of Americans

China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.

The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.

The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.

https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks

#China #US #mobile #phone #networks #intelligence #spy #surveillance
Media is too big
VIEW IN TELEGRAM
The Shameless EXTORTION in Mobile Gaming

The mobile gaming industry has long been dominated by scams, false advertising, and shady business practices but today we can add extortion to the list, because 37GAMES, a world renowned developer with top 100 properties on the app-store, has decided to extort their low paying users (not their whales) for large amounts of cash.

In the world of exploit or "glitch" punishment by gaming developers, this might be the worst response I have ever seen.

https://www.youtube.com/watch?v=ZADqK-D6vPo

#mobile #gaming #industry #extortion #video
🎥 @nogoolag 🎥 @blackbox_archiv
recycled-numbers-latest.pdf
347.8 KB
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States

35 million phone numbers are disconnected in the U.S. every year. Standard industry practice is to reassign those numbers to other subscribers. But this leads to many types of security and privacy risks, which our study analyzes rigorously.

https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf

https://recyclednumbers.cs.princeton.edu/

#security #privacy #phone #number #recycling #usa #mobile #carriers #pdf
📡 @nogoolag 📡 @blackbox_archiv
Off the Grid Messenger

Off The Grid (OTG) Messenger is an easy way for people to communicate through text messages when in remote areas. With a theoretical transmission range of 10 miles (16kms), OTG messenger can be used by groups of people to stay connected when they are in areas not serviced by mobile connectivity.

For portability and low power purposes, the device was created by re-purposing an old Nokia e63 phone I had laying around. The enclosure, LCD, keypad, backlighting and speaker have been re-used however the motherboard was re-designed from the ground up with low power components, a modern STM32 H7 microcontroller, an ISM LoRA radio and expanded flash memory.

https://github.com/TrevorAttema/OTGMessenger

Comments
https://news.ycombinator.com/item?id=27659105

https://hackaday.com/2021/06/26/lora-messenger-in-nokias-shell/

#otg #offthegrid #grid #im #messenger #alternatives #cellphone #mobile #nokia
0xor0ne@infosec.exchange - Nice short blog post by Aditya Dixit explaining how to intercept and manipulate AES encrypted traffic used by mobile applications

https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys

#android #infosec #cybersecurity #AES #APK #mobile #encryption
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away | Ars Technica

Researchers have devised a novel attack that recovers the secret encryption keys stored in smart cards and smartphones by using cameras in iPhones or commercial surveillance systems to video record power LEDs that show when the card reader or smartphone is turned on.
The attacks enable a new way to exploit two previously disclosed side channels, a class of attack that measures physical effects that leak from a device as it performs a cryptographic operation. By carefully monitoring characteristics such as power consumption, sound, electromagnetic emissions, or the amount of time it takes for an operation to occur, attackers can assemble enough information to recover secret keys that underpin the security and confidentiality of a cryptographic algorithm.


Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED – https://eprint.iacr.org/2023/923

#Hacking #Crypto #mobile
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure | The Citizen Lab –
26/10/2023

The information collected by, and stored within, mobile networks can represent one of the most current and comprehensive dossiers of our life. Our mobile phones are connected to these networks and reveal our behaviours, demographic details, social communities, shopping habits, sleeping patterns, and where we live and work, as well as provide a view into our travel history. This information, in aggregate, is jeopardized, however, by technical vulnerabilities in mobile communications networks.

#Vulnerabilities #mobile #Networks
When You Roam, You’re Not Alone | Lawfare –

A fix is long overdue for one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks

We’ve all been there before: You’re traveling abroad, and as your plane lands and is taxiing to the gate, you reach for your phone, wait for it to connect to the local network, and then you are greeted with a text message: “Welcome abroad, you’re now roaming!” Beyond the exorbitant fees, few of us are likely to give the matter much thought.

However, hidden within this seemingly routine transaction lies one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks.

#Mobile #Network #Cellular #Roaming #Vulnerabilities