• ☂️-@lemmy.ml
    link
    fedilink
    arrow-up
    49
    ·
    edit-2
    1 day ago

    reminder the modem firmware we use on our phones is exploitable and most likely backdoored, and in some cases it has memory access to the rest of the device. israeli espionage companies can do it and sell their capabilities to law enforcement. (this somewhat applies to pcs with ME and PSP too, btw)

    meaning they can target you regardless of what software you use. maybe not as easily or automated i guess, but always keep it in mind with their tech.

      • ☂️-@lemmy.ml
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        1 day ago

        graphene doesn’t replace the modem firmware. i don’t think modem firmware can be replaced on most phones.

        • opfar.v30@lemmy.ml
          link
          fedilink
          arrow-up
          7
          ·
          1 day ago

          Is the baseband isolated?

          Yes, the baseband is isolated on all of the officially supported devices.

          And

          The mobile Atheros Wi-Fi driver/firmware is primarily a SoftMAC implementation with the vast majority of the complexity in the driver rather than the firmware. The fully functional driver is massive and the firmware is quite small.

    • chillpanzee@lemmy.ml
      link
      fedilink
      English
      arrow-up
      10
      ·
      2 days ago

      True, but they don’t even need 0days or software exploits to breach the systems. The data is harvested legally and sold to whoever wants to pay for it. Insane amounts of data about everything you do is made commercially available by phone platforms, tech companies, apps, banks, email providers, retail establishments, cell phone carriers, governments, and of course their continual data breaches.

      Anybody can target you too, it doesn’t have to be espionage outfits or state sponsored threat actors. It’s just for sale.

      • ☂️-@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        1 day ago

        my key point is that they can rely on these exploits/backdoors if you are resistant in using the commercial data harvesting software, and they need to find you for some reason.