this post was submitted on 13 Oct 2023
17 points (79.3% liked)

Privacy

31381 readers
254 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
17
Android Hardware Surveillance (upload.wikimedia.org)
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]
 

Could it be that the processor sends data from the camera/microphone to the Qualcomm/Mediatek servers, bypassing the system? Is it possible to find out about this by checking the traffic leaving the device? Are there any studies that have done this? If this happens, then even GrapheneOS becomes mostly meaningless.

top 4 comments
sorted by: hot top controversial new old
[–] [email protected] 11 points 11 months ago (1 children)

Yes, its possible to check. Data has to be sent through some connection, and we are able to monitor all traffic going through connections we control. Its not happening on wifi and not on 4G/etc. So unless there is some other connection that is not a real issue.

[–] [email protected] 1 points 11 months ago

It would be interesting to see research on this topic :)

[–] [email protected] 7 points 11 months ago* (last edited 11 months ago) (1 children)

doubt

I think it would be way easier get data from preinstalled apps. It wouldn't make any sense to bug devices at a hardware level as that would involve a ton of work for a small minority of people who use custom Roms.

I am a little concerned about cell towers getting my location all the the time but that isn't the same thing as a hardware backdoor.

[–] [email protected] 0 points 11 months ago

In general I think the same. Too difficult to implement and easy to detect. I wonder if there are studies on this topic)