![]() |
2012-12-18
, 18:37
|
|
Posts: 148 |
Thanked: 217 times |
Joined on Jul 2010
@ Yerevan
|
#22
|
It all depends on your threat model. Commonly, one assumes that everyone is Out To Get You™. In this case, this implies that your carrier and the government cooperate.
So this means that The Man knows about everything you send to or receive from your carrier. While you're logged into the mobile network, this includes approximate location data.
I'm pretty sure that tablet mode wasn't designed for any sort of security-sensitive scenario.
This just off the top of my head. If you insist on security, you'd do better with a laptop with Linux. In the extreme, the RMS approach.
![]() |
2012-12-18
, 21:55
|
Posts: 123 |
Thanked: 91 times |
Joined on Apr 2012
|
#23
|
The Following User Says Thank You to evujumenuk For This Useful Post: | ||
![]() |
2012-12-18
, 22:22
|
Posts: 1,225 |
Thanked: 1,905 times |
Joined on Feb 2011
@ Quezon City, Philippines
|
#24
|
What do we know about Maemo/MeeGo? We know that both Fremantle and Harmattan contain non free software and free software.
Which parts are non-free? As far as I know this are GSM chip driver, GPS chip driver, GSM chip firmware. And as far as I know the same non-free software is used in Nemomobile hardware adaptations. So does this mean that we have the same security threats when using Nemo vs using Maemo?
So if we don't use free GSM firmware and drivers we don't know what can do carrier. And I wonder, what does this tablet mode, and this offline mode? What can do carrier when n900 is in tablet mode? Does it take the GSM chip to sleep mode? How GSM chip gets out of this mode? By signal from the board or by radio signal?
Can the carrier get stream from microphone when the tablet mode is used or when the phone is in offline mode?
![]() |
2012-12-19
, 00:37
|
|
Posts: 381 |
Thanked: 336 times |
Joined on Jan 2011
@ Stockholm, Sweden
|
#25
|
I know that if I use some provider's email service like google's then google may, or may not, share this information with some other parties.
The Following User Says Thank You to electroaudio For This Useful Post: | ||
![]() |
2012-12-19
, 02:27
|
Posts: 54 |
Thanked: 16 times |
Joined on Oct 2011
@ Buenos Aires, Argentina
|
#26
|
![]() |
2012-12-19
, 09:03
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#27
|
The new question is
Why do you trust more a WIFI network? Where ANYONE could make you a MITM attack?
The Following User Says Thank You to reinob For This Useful Post: | ||
![]() |
2012-12-19
, 09:58
|
|
Posts: 148 |
Thanked: 217 times |
Joined on Jul 2010
@ Yerevan
|
#28
|
To be serious, arent google and facebook the ones that you really want to protect yourself from?
Their businessmodel is to harvest information about people and sell that to advertizers and others that is willing to pay for it.
![]() |
2012-12-19
, 10:01
|
|
Posts: 148 |
Thanked: 217 times |
Joined on Jul 2010
@ Yerevan
|
#29
|
As for what the carrier can do in tablet mode (GSM radio off), they can't do jack. It's been verified that it is in fact turned off (by the OS), and cannot receive signals.
![]() |
2012-12-19
, 10:04
|
|
Posts: 148 |
Thanked: 217 times |
Joined on Jul 2010
@ Yerevan
|
#30
|
Okay, I think I see what you're getting at. Simply put, you'd like to know about the security-related issues a device such as the N9(50) brings along as a result of it being not only a computer, but a mobile communications device.
"Lawful Intercept" interfaces in cell tower software or Stingray-type intercept devices can do this easily, assuming you're being monitored by LEOs (or other entities)
/tinfoil
In all seriousness, the only piece of software you should worry about if you were privacy-conscious is the baseband, which is closed for obvious reasons.
However, unlike some Android devices, the CPU talks to the baseband over SSI, and not thru a memory device.
It should be doable to audit the communication between these two.
If you were truly a paranoid tinfoil hatter, you'd be running an obscure microkernel OS on a synthesized OpenCores IP block on an FPGA with an open compiler, interfacing on GSM networks with a USRP and OsmocomBB.
Oh, and a 500-pack of one-time-use SIM cards.
N9 PR 1.3 Open Mode + kernel-plus for Harmattan
@kenweknot, working on Glacier for Nemo.