The Following User Says Thank You to szopin For This Useful Post: | ||
|
2013-12-13
, 22:56
|
Posts: 63 |
Thanked: 75 times |
Joined on Jul 2012
@ Austria
|
#2
|
The Following User Says Thank You to N9uwu For This Useful Post: | ||
|
2013-12-13
, 22:58
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#3
|
As long as "all other people", as in people you interact with on a day to day basis, use apps/tools without a sufficient crypto, you might aswell accept that you are being monitored . Even if you can prove that the phone itself is "clean" - what about all the traffic you send and receive e.g. over your carrier network? So the only proofing there is, is strong end to end crypto - and there should at least be android apps for that.
|
2013-12-13
, 23:08
|
Posts: 63 |
Thanked: 75 times |
Joined on Jul 2012
@ Austria
|
#4
|
The Following User Says Thank You to N9uwu For This Useful Post: | ||
|
2013-12-13
, 23:18
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#5
|
Well even if there are options (and yes of course it is doable ), the fact and the matters is, that it is really hard to convince average joe (even if average joe happens to be a family member/a good friend) to transition away from skype or application X, or just ordinary voice calls.
|
2013-12-14
, 08:43
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#6
|
|
2013-12-14
, 09:04
|
Posts: 646 |
Thanked: 1,124 times |
Joined on Jul 2010
@ Espoo, Finland
|
#7
|
The Following User Says Thank You to minimos For This Useful Post: | ||
|
2013-12-14
, 11:09
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#8
|
The idea is not about one-button-click secure from NSA solution, this will never happen, more about: is it even possible?
Some claim 'there is no NSA on Jolla', I would really like to believe it. How can (is it at all possible, skipping the obvious 'linux kernel openness vs billions of dollars NSA can pay for 0-days' dilemma) one check/investigate what is happening with his device. (yeah carrying Jolla + separate device for communication will not work, BTS usage will identify you instantly (jolla on wifi only, no data/roaming with macchanger every 5 minutes? I hope this is like Neo900 where you will be able to trust modem is actually OFF without removing the battery), but can jolla be 'safe' as for carrying corporate documents? I would not trust WP/iOS/Android for such)
|
2013-12-20
, 00:26
|
Posts: 1,225 |
Thanked: 1,905 times |
Joined on Feb 2011
@ Quezon City, Philippines
|
#9
|
Actually this is something that I have been thinking about, it is far from impossible
|
2013-12-20
, 02:24
|
Posts: 26 |
Thanked: 2 times |
Joined on Feb 2011
|
#10
|
The Following User Says Thank You to eldiablo For This Useful Post: | ||
The question: How can you tell? (if your device is secure, if the app doesn't sneakily send out your private data)
First thing that comes to mind:
Wireshark on device -> Yamas or any other MITM tool (N900 should work nicely for this, also wireshark on it doesn't have to wait for Wayland support) -> router
Compare what Wireshark gives you vs what Yamas captures, matches = no low level sneaky stuff in OS (is this positive/conclusive? can something sneak through MITM?)
Verifying apps is getting a little trickier. Sure you can capture, but most apps will encode data, so even if you get same dump, you will not know what is inside (your contacts/addresses?). Yamas will help only with https, so no luck here.
One way would be to provide crooked ssl.so that is decodable/predictable, though seeing what measures people put in skype vs reveng one could assume an NSA app will come with its own libraries.
Play with the clock/random number generator of the device (would that be even possible or would the whole system crash/die?) so their own lib generates multiple times the same encoding (prepare contacts and all other worth stealing info on the device so you can repeat this as many times as you want and deduce the algorithm from there?)
So, is there a way to really NSA-proof yourself? (even if proprietary-binary scenario with fake .so's is unrealistic, would vetting the system with Wireshark/MITM actually give some insight?)