this post was submitted on 13 Oct 2023
18 points (82.1% liked)

Privacy

31974 readers
241 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
18
Android Hardware Surveillance (upload.wikimedia.org)
submitted 1 year ago* (last edited 1 year ago) by FarLine99@lemm.ee to c/privacy@lemmy.ml
 

Could it be that the processor sends data from the camera/microphone to the Qualcomm/Mediatek servers, bypassing the system? Is it possible to find out about this by checking the traffic leaving the device? Are there any studies that have done this? If this happens, then even GrapheneOS becomes mostly meaningless.

top 6 comments
sorted by: hot top controversial new old
[–] tuxed@sh.itjust.works 11 points 1 year ago (1 children)

Yes, its possible to check. Data has to be sent through some connection, and we are able to monitor all traffic going through connections we control. Its not happening on wifi and not on 4G/etc. So unless there is some other connection that is not a real issue.

[–] FarLine99@lemm.ee 2 points 1 year ago

It would be interesting to see research on this topic :)

[–] possiblylinux127@lemmy.zip 10 points 1 year ago* (last edited 1 year ago) (1 children)

doubt

I think it would be way easier get data from preinstalled apps. It wouldn't make any sense to bug devices at a hardware level as that would involve a ton of work for a small minority of people who use custom Roms.

I am a little concerned about cell towers getting my location all the the time but that isn't the same thing as a hardware backdoor.

[–] FarLine99@lemm.ee 1 points 1 year ago

In general I think the same. Too difficult to implement and easy to detect. I wonder if there are studies on this topic)

[–] drwho@beehaw.org 6 points 1 year ago (1 children)

The thing about the hardware (radios, in particular) built into Android devices is that, by and large they're SDRs. They must load firmware blobs for even basic operation. It wouldn't be too difficult to backdoor that because there are no public tools for writing or debugging the firmware, and it wouldn't surprise me if some of the better firmware was written in straight assembly (for that radio's microcontroller).

That said, it's far easier to implement surveillance attacks from the application level. Much better return on time spent for the attacker, too.

[–] FarLine99@lemm.ee 2 points 1 year ago

Agree. It's much simpler. But there are still many people who use custom roms, which means that tracking at the hardware level may appear over time.