Very interesting video about the tracking of cellular networks.

    • @[email protected]
      link
      fedilink
      English
      16
      edit-2
      11 months ago

      I’m by no means an expert, but how is it the phone can still make emergency calls if it has zero contact with the network if it’s simless? Seems like a solution that isn’t actually one, especially if you consider stuff like IMIE numbers.

      And I’m sure if I could be bothered to look into this solution I would be right.

      Plus most tracking and privacy violations work just as well if not better via WiFi.

      • @[email protected]
        link
        fedilink
        1111 months ago

        Simless phones can make emergency calls because the towers are configured to accept a request for an emergency call to any device that handshakes sufficiently (in Europe and most of Asia anyway, I assume also true of USA because it does work).

        The phone is able to contact the nearest tower and initiate a call because it scans for the nearest towers in the boot process in order to go to the next step (check sim details and connect to configured provider). In the process of determining available towers it provides the IMEI to each of them.

        If you live in a country where you have to provide ID to buy a handset then this definitely isn’t anonymous, but even if you are in a country that doesnt, all the manufacturers track where every IMEI is shipped, and sku numbers on POS will easily allow determination of exactly when the device was sold. Even if you paid cash there will be CCTV footage of the purchase.

        TL;DR this will work mostly until you make a mistake against corporate tracking but will absolutely not protect you from three-letter-acronyms and law enforcement.

        Consider your threat model carefully before relying on it

        • haui
          link
          fedilink
          211 months ago

          Thanks for elaborating. This was an interesting read.

        • @[email protected]
          link
          fedilink
          211 months ago

          In germany for example is it not possible to perform an emergency call without a sim card. But this is thanks to a law and not the technical side.

        • @[email protected]
          link
          fedilink
          -411 months ago

          But it doesn’t work. The phone just says “NO NETWORK” and you can;t make any calls,

          You can make emergency calls on a phone with an expired SIM card whose phone number has been re-used. So that would not be traceable to the number, but they can still triangulate your position.

      • @[email protected]
        link
        fedilink
        111 months ago

        When she saids no sim I am thinking we can assume she also means your turning off the cellular radio. (Why would leave that one if you don’t have service?) Just wasting battery and I am pretty sure you are still hanging out your location to carriers.

    • Fleppensteyn
      link
      fedilink
      1211 months ago

      She puts a sim card in another phone that’s used as a hotspot. The title suggests she doesn’t use a sim.

      • @[email protected]
        link
        fedilink
        311 months ago

        But she explains why that is different in the video.

        The idea is the hotspot is an entirely separate device, that just provides Internet access/VPN access. Your not logging in to your VoIP provider or your messaging applications using that hotspot. You can also purchase the device and service anonymously making it much harder to connect to your identity to the hotspot.

        This separates the baseband processor from our sensitive data that is stored on our phone. This also forces your phone to actually use the VPN. (There has been reports that Apple and Google bypass the VPN in some cases if you use a VPN on your phone.)

    • @[email protected]OP
      link
      fedilink
      311 months ago

      Probably because of the YouTube link. I will try to post a more private alternative next time.

    • 7heo
      link
      fedilink
      111 months ago

      The video has many inaccuracies.

      While the gist of it is correct, and physical OSI layers separation is indeed better for control (there is a valid reasons for “hardware” firewalls to exist), a lot of what she says is vastly extrapolated at best, or arguably wrong at worst.

      And then, yes, regardless of the content, I’m pretty sure YouTube videos will be downvoted here.