03-25-2021, 04:29 PM
(03-24-2021, 10:44 PM)C0ffeeFreak Wrote:(03-24-2021, 08:06 PM)Zebulon Walton Wrote: I had a thought about AT&T using browser's user agent string to ID the Pinephone as a non-whitelisted device. What about when phones use their cellular data connection for internet hot-spots? Basically any kind of device or browser might be connecting through the provider's network in that situation. How would AT&T distinguish between a Pinephone browser reporting that it's running on a Linux computer and any number of other devices that might be connected via the hot-spot reporting the same thing?
Yep, I mention this in my instructions for adding Chromium and freezing and changing the user agent. Desktop data packets can go against your hotspot data limit if you have one. It can get you disconnected if you don't have a hotspot plan. It will get you looked at if all your packets are desktop instead of mobile all the time. They will thing it's being used for main WIFI. Best to follow those instructions and make sure your user agent isn't leaking with certain carriers and plans. I think that's whats getting people busted on Cricket. They either aren't paying the $10 a month for the hotspot or they are going over their 10GB allotment if they have it. It wouldn't be hard to do it you stream YouTube all day.
TCP/IP packets have other meta that providers use to sniff out hotspot bandits (like me), namely they use TTL. There are many tutorials on ways to obfuscate that data but all you really need is VPN configured on your gateway connection.
When I cannot pass hotspot traffic I switch to my vpn config and boom. The spice must flow! :D
Cheers!