07-03-2021, 05:57 AM
I'm unsure if people are aware enough. But even if you use so called "Dumb Phone" you are putting a backdoor of your own Telecom Service Provider, which is a computer with a software on its own that is Smart Card which in phones case is SIM card.
Civilian grade radios (including mobile services) are a joke for military intelligence. Because of that thing those ancient or even recent so called "Dumb Phones" (with Smart Cards in them) are usually much less secure than some of the so called Smart Phones.
Issue is that it depends how much control you've got on your Mobile Modem in a cellphone and how much backward compatibility it has, because a lot of even modern made phones, can be targeted and made to fall back to some ancient clear text protocols of SMS and Calls, making it very very very easy to listen to your calls.
As for passive surveillance of background recordings via mic thats something else and probably kill switches is the only way to be sure, but be very aware, radio technology was first taken advantage of by Navies not by civilians and since then theres just heavy rules for only specific frequencies allowed to be encrypted for comms, which is in wifi case too short range, and all that GSM->2G->2.5G->3G.... whatever is highly supervised and then you get Amateur Radio which is quite long rage as of self hosted service, but must only be used in clear text.
But just be ware, lasers pointed at windows measuring vibrations, passive listening devices such as https://en.wikipedia.org/wiki/The_Thing_..._device%29
are there for at least 50 years now, so this concentration of a single pike of a palisade of your counter-intelligence is something too narrowing a whole point of resisting surveillance.
Many many phones sold in specific countries comes with preinstalled nonsenses, that detects whether you're thetering mobile internet only based on whats on the sim card (I cannot go in higher detail here, but I hacked some sim cards in very low tech manner to bypass that, thing is that newer sim cards comes with more advanced and malicious software on it.
So as long as you put that backdoor there on your own, just try not to focus on any other possible backdoors on the KaiOS or whatever....
Civilian grade radios (including mobile services) are a joke for military intelligence. Because of that thing those ancient or even recent so called "Dumb Phones" (with Smart Cards in them) are usually much less secure than some of the so called Smart Phones.
Issue is that it depends how much control you've got on your Mobile Modem in a cellphone and how much backward compatibility it has, because a lot of even modern made phones, can be targeted and made to fall back to some ancient clear text protocols of SMS and Calls, making it very very very easy to listen to your calls.
As for passive surveillance of background recordings via mic thats something else and probably kill switches is the only way to be sure, but be very aware, radio technology was first taken advantage of by Navies not by civilians and since then theres just heavy rules for only specific frequencies allowed to be encrypted for comms, which is in wifi case too short range, and all that GSM->2G->2.5G->3G.... whatever is highly supervised and then you get Amateur Radio which is quite long rage as of self hosted service, but must only be used in clear text.
But just be ware, lasers pointed at windows measuring vibrations, passive listening devices such as https://en.wikipedia.org/wiki/The_Thing_..._device%29
are there for at least 50 years now, so this concentration of a single pike of a palisade of your counter-intelligence is something too narrowing a whole point of resisting surveillance.
Many many phones sold in specific countries comes with preinstalled nonsenses, that detects whether you're thetering mobile internet only based on whats on the sim card (I cannot go in higher detail here, but I hacked some sim cards in very low tech manner to bypass that, thing is that newer sim cards comes with more advanced and malicious software on it.
So as long as you put that backdoor there on your own, just try not to focus on any other possible backdoors on the KaiOS or whatever....