Many telecoms are phasing out older frequencies for re-allocation. But this new exploit does target a newer spectrum (4G/LTE).
It appears that ‘log4j’ is a thing and it’s melting down the internet but with all things, it’s exaggerated at first and later downplayed.
Even with Google-based hardware, you can de-bloat your phone and it does not have Google-based tracking. It’s all a matter of the firmware or in this case AOSP.
I learned of this while catching up with my old friends at #ITPro.TV. Once I heard of this I was like this could be awesome for security researchers. What a way to possibly reverse engineer at cell network from the ground up.
Never use the same email/phone/device on the net. Big Tech is using 2FA/MFA to link you. Once done it can’t be reversed. The data is already loose. Nothing is truly deleted on the interwebs.
Here is a tutorial of Dave demonstrating what EXIF data is and how to view it and later remove it from your photos before uploading them to the net.
Four different malicious frameworks designed to attack air-gapped networks were detected in the first half of 2020 alone, bringing the total number of such toolkits to 17 and offering adversaries a pathway to cyber espionage and exfiltrate classified information. “All frameworks are designed to perform some form of espionage, [and] all the frameworks used USB drives as the physical transmission
Qualcomm has a solution for ‘stingray’ devices hijacking your cell connection, and apps will be able to use it too
You probably don’t wake up in the morning worried that your phone is going to outright betray you. Malware and security snafus are one thing, but updates keep that boogeyman away. And even though we read about bad guys caught by Stingrays and dirtboxes (false cell towers), that’s just something authorities use to keep us safe — right?
I’ve done a few of these but I’ve learned a lot since then.
Recent CommentsNo comments to show.