zlacker

[parent] [thread] 4 comments
1. eladri+(OP)[view] [source] 2019-07-02 15:54:36
I bought a dual sim Mi phone for this purpose as well. It worked out really well. At the border crossing from Hong Kong into mainland china, they didn't seem interested in my devices fortunately. Still will wipe my phone before I use it again, however.
replies(1): >>kjafta+2a1
2. kjafta+2a1[view] [source] 2019-07-03 01:09:32
>>eladri+(OP)
even if you wipe your phone you can still have a compromised baseband.
replies(1): >>manjan+ZA1
◧◩
3. manjan+ZA1[view] [source] [discussion] 2019-07-03 07:50:59
>>kjafta+2a1
Could you elaborate a bit on this please? I have never heard of such a phenomena which intrigues me quite a bit!
replies(2): >>isosta+2M1 >>gargra+0f2
◧◩◪
4. isosta+2M1[view] [source] [discussion] 2019-07-03 10:41:23
>>manjan+ZA1
I suspect OP is thinking where a phone may be taken out of your hands/sight and had paranoid things physically done to it - as in the article.
◧◩◪
5. gargra+0f2[view] [source] [discussion] 2019-07-03 15:11:37
>>manjan+ZA1
All phones have a 'baseband' firmware which controls the actual radio hardware - it's a binary blob installed by the manufacturer and generally not available to the user to tinker with, although as expected there have been many projects to reverse-engineer them. The firmware exists 'beneath' the OS and all user settings, so in theory, if it's compromised (and there have been PoCs), anything that happens in the baseband would survive a wipe and reinstall of the OS. Basically it means putting malware in a place that the user cannot delete it from.

Malware in the baseband firmware could theoretically intercept or disrupt radio traffic, or migrate from the firmware to the phone via other exploits in the OS to gain even more control. In essence, it's a particularly nasty thing that surveillance states would definitely use to their advantage.

This is why 'burner' devices should be exactly that - destroyed after use, because you simply cannot trust them after they've been anywhere near an invasive surveillance setting.

[go to top]