Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Wednesday April 20 2016, @01:11PM   Printer-friendly
from the joining-the-21st-century dept.

Phones can only last so long and my admittedly ancient BlackBerry Curve took one-too-many tumbles and now needs to be replaced. Thanks to recent changes in the cell-phone market, I'm looking to purchase a phone, outright, and get a month-to-month plan for it.

I am very privacy conscious and have, so far, avoided Apple (walled garden - blegh) or Android (tell Google everything). I suspect there are fellow Soylentils who hold a similar perspective. (My current cell provider is US Cellular. I'm open to change, but would like to avoid AT&T and Verizon --- have heard too many horror stories.)

Background: I've been programming computers since the 1970s. I've tried using Apple products, but it seems they are user-friendly to the extent that you want to do what they have already decided is okay. They seem to expose a bare minimum of controls to allow customization. That would frustrate me to no end.

So, that leaves me with Android as the other major alternative. I am leery about giving any more info to Google than necessary -- given a choice, I regularly choose an alternative over a Google product (i.e. DuckDuckGo for search, openstreetmap, etc.)

My thoughts, at the moment, are to get a phone and load cyanogenmod on it. I've read good things about the privacy capabilities it provides; especially fine-grained allow/deny access permissions. Added bonus is ability to apply updates more frequently than a telco-branded phone would provide. I have no experience with rooting/flashing a phone, so I need this process to be as idiot-proof as possible. Also, I'm leery of getting a phone only to see support for it dropped shortly thereafter.

[Continues...]

Must-have: SOLID cellular reception (my apartment seems to have plaster walls - the BB still got great reception), removable battery, removable storage (micro-SD card), WiFi, LTE (USA), good camera, and fine-grained permissions control.

Nice-to-have: hardware keyboard, tethering (i.e. use my phone to get an internet connection that I'd share with my laptop), FM Radio.

REALLY nice to have: Ability to bring up a terminal window and have full CLI ability (e.g. bash) where I could edit/run custom scripts/programs.

Size/specs: I do not want or need a phablet or the latest/greatest processors. I'm reminded of the adage to buy last-year's top-of-the-line model. For some degree of future-proofing, would like to be able to view 1080p content on it.

Other: What did I forget? What things do you wish you knew that you only found out after you got your phone?

My main system runs Win 7 Pro but I could also run a live CD with some Linux distro.

What have your experiences been? Both positive and negative? Please save me from making a mistake that you have already learned from!

I'm looking to replace my phone within the next day or so. I've been impressed with the shared knowledge of this community -- please help!


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by edIII on Wednesday April 20 2016, @08:20PM

    by edIII (791) on Wednesday April 20 2016, @08:20PM (#334889)

    DO NOT go gentle into that good night.

    So.... why leave out the burner phones?

    I absolutely, utterly, and forever refuse to give any kind of identifying information whatsoever to a carrier again. If you do, and this is unavoidably and unarguably true: You're under mass surveillance 24/7 by government .

    Worrying about a phone? They lock you into the PSTN system with zero protection or support, and also apparently guarantees 60 minutes can access it because SS7 is as secured as SCADA. The more you fight to unlock that bootloader, the more you're just making a literal spectacle of yourself in front of the cell towers.

    Since PSTN surveillance is completely and totally unavoidable with Verisign operating the mediation switches for the Tier 1 providers, you might as well give up. You can't secure PSTN traffic, but you can use it as an untrusted line to move to trusted ones. Fighting to secure the phone also seems quite pointless to me.

    Here's what I do:

    1) Get yourself the most basic burner phone model possible.
    2) You're a small boy. Therefore, start installing stupid ass games from the Google play store. Yes, play with it occasionally. Regularly search for banal stuff via the browser. Whatever you do, you're acting as somebody else to provide a fake behavioral profile associated with this device. Become an actor :)
    3) Texting is free most likely with the correct plan, so sign up for "Cat Facts". If you can have an automated bot, all the better.
    4) Lock it into tether mode.
    5) Connect your real tablet to it, treating the connection as untrusted. Meaning, use proxies, TOR, whatever you need and can do to obfuscate your traffic back to your servers.
    6) Perform your communications and business over this, using very strongly encrypted connections. Doing so it is possible with enterprise phone software (thankfully Open Source or FOSS) to make that tablet an endpoint, even connected to different PSTN numbers. Texting, even straight SMS, can be moved over to this device. Many large providers for SIP services now also offer SMS at the same time, on the same numbers. So this "landline" number is now no different than a cell phone number to anyone you deal with.
    7) Every 60-90 days, wash, rinse, & repeat.

    I recommend giving the phone to a homeless person, or somebody in need. That way the fake behavioral profile starts to change, but it doesn't actually stop producing data points either. Anyone attempting to find you from your enterprise endpoints in use on the tablet will hit your servers first, and even then, they need to do a bit more work to identify that burner phone as the one connected. Whatever happens, the likelihood of you noticing somebody attempting to trace you could be quite high if you're the actual personnel that law enforcement would need to speak with to do so in the first place....

    Yes, DO NOT GO GENTLE INTO THAT GOOD NIGHT

    --
    Technically, lunchtime is at any moment. It's just a wave function.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 5, Funny) by dyingtolive on Wednesday April 20 2016, @08:52PM

    by dyingtolive (952) on Wednesday April 20 2016, @08:52PM (#334907)

    I think I'd rather the government see me listening to some music on my way home from work than deal with the fact that cell tower triangulation reports that I seem to have someone resembling a minor at my house every two months, only to be replaced by another as their old phone mysteriously winds up in the hands of a homeless man.

    --
    Don't blame me, I voted for moose wang!
    • (Score: 4, Funny) by edIII on Wednesday April 20 2016, @09:50PM

      by edIII (791) on Wednesday April 20 2016, @09:50PM (#334933)

      I....

      That had not occurred to me. Obviously no plan is perfect at first...

      --
      Technically, lunchtime is at any moment. It's just a wave function.
      • (Score: 2) by dyingtolive on Wednesday April 20 2016, @11:12PM

        by dyingtolive (952) on Wednesday April 20 2016, @11:12PM (#334962)

        Well, I mean, the first couple might not even throw a flag. For all I know, the 50th one wouldn't throw a red flag. And for all I know, you can't triangulate position off towers (god forbid GPS doesn't disable when you tell it to like a lot of people suspect) precisely enough for it to be tracked down to you. The funny thing about paranoia though is that you don't know which of those assumptions are safe to rely on. :)

        Semi-on-topic: I wonder if there's been any reports of anyone with a used phone getting investigated for things the former owner did.

        --
        Don't blame me, I voted for moose wang!
  • (Score: 0) by Anonymous Coward on Wednesday April 20 2016, @11:27PM

    by Anonymous Coward on Wednesday April 20 2016, @11:27PM (#334965)

    I recommend giving the phone to a homeless person, or somebody in need. That way the fake behavioral profile starts to change, but it doesn't actually stop producing data points either. Anyone attempting to find you from your enterprise endpoints in use on the tablet will hit your servers first, and even then, they need to do a bit more work to identify that burner phone as the one connected.

    Are you sure you would want to tie a homeless person to your personal behavioural profile? Are you really sure about that? Yes, I know that using proxies will keep all but the most determined of law enforcement agencies at bay, but it is never going to be 100%. It seems to me that giving the phone to a homeless person in order to cover your tracks is just asking for trouble. For example, if the homeless guy is a recently released sex offender, I could easily see you having to face some pretty nasty and thorough investigation by law enforcement if that guy decided to have some rather unsavoury internet browsing habits. Just sayin'.

    • (Score: 2) by edIII on Thursday April 21 2016, @06:34AM

      by edIII (791) on Thursday April 21 2016, @06:34AM (#335078)

      Are you sure you would want to tie a homeless person to your personal behavioural profile?

      No, that would be stupid. Which is why you keep your personal behavioral profile on your tablet, and you use a fake behavioral profile on the burner phone. Nothing you do on the burner phone should be tied to your identity in any way, shape, or form unless its via a secure tunnel originating from the tablet to an endpoint on the Internet. All of it needs to be fake, or as general as humanly possible.

      Yes, I know that using proxies will keep all but the most determined of law enforcement agencies at bay, but it is never going to be 100%.

      If it's imperfect then law enforcement understands what the burner phone is, and what my tablet is, and the difference between them operationally. They're not confused about identities, and therefore I can call them out on that.

      If it's perfect than law enforcement can only have access to the fake behavioral profile and we have nothing to worry about.

      It seems to me that giving the phone to a homeless person in order to cover your tracks is just asking for trouble. For example, if the homeless guy is a recently released sex offender, I could easily see you having to face some pretty nasty and thorough investigation by law enforcement if that guy decided to have some rather unsavoury internet browsing habits. Just sayin'.

      That would be really interesting since many of my burner phones are purchased with cash by a homeless person in the first place. I wait out in the parking lot for it.

      Completely unconcerned though. I'm already working with the homeless and materially deprived people in my community. If law enforcement started giving me crap, I would shut those fuckers down in a split second with, "So... I can't give my phone to a person in need? I believe I can. I believe I did. I also believe you need to go deal with that person and not the one giving care packages to the homeless. If you have a problem with that... [hold my hands out to be arrested]". I'm not intimidated about dealing with cops, or that I may have to go to jail. Doing so only provides the community litigation vehicles to accomplish changes in incorrect and harmful policy. It wouldn't be the first time that cops were getting in the way of community organized efforts to help people. Sometimes they need to be reminded that just because a person is homeless the rules don't actually change on how they need to treat them.

      Me giving homeless people phones serves two purposes at the same time, one of them being to provide them with some of the things they need. 30 days worth of phone service is something homeless people need, and it helps.

      --
      Technically, lunchtime is at any moment. It's just a wave function.
  • (Score: 2) by khakipuce on Thursday April 21 2016, @08:33AM

    by khakipuce (233) on Thursday April 21 2016, @08:33AM (#335112)

    So the government, assuming they at all give a sh!t about you and your data (what the hell are you doing in your spare time anyway?) see a burner phone with a large amount of encrypted data emanating from it. A few months later that stops and a new burner (what? if they have the level of tracking that your paranoia suggests, they surely know which phones have registered addresses and which don't) appear in the same area with the same volume of encrypted data.

    You better not be a Muslim or look at all like you originate from the middle east.

    • (Score: 2) by edIII on Thursday April 21 2016, @06:42PM

      by edIII (791) on Thursday April 21 2016, @06:42PM (#335361)

      what the hell are you doing in your spare time anyway?

      I'm attempting to create a system whereby people can exchange burner phones and specific helper programs to simulate behavior on those burner phones. The burner phone itself is reduced to a device providing an untrusted route. Nothing more, nothing less. The behavioral programs are designed to make all burner phones look the same, in so far as their consumption patterns. If successful, then we all appear to be operating a TOR network across burner phones. That's NOT ILLEGAL, so they come ask me what I'm doing at any time and I have a perfect excuse :)

      Yeah, sometimes some people have to take a hit for the TOR network, but I look at that as a badge of honor should it happen.

      what? if they have the level of tracking that your paranoia suggests, they surely know which phones have registered addresses and which don't

      And? They are all practically unregistered. Most people getting these things are purchasing refill cards for cash. In any case, if you have over 10k+ participating devices across the country that are unregistered that gives you plausible deniability. The same principle upon which TOR operates. The fact some phones may be registered is immaterial to providing the plausible deniability network.

      The new burner phone can be somebody else's old burner phone too, which is really the point. All of the burner phones in the system are being exchanged, preferably across large geographic areas. Remember, the only thing you care about is having an untrusted route for your real device. Security considerations are fairly minimal if you are exchanging often, and you can trust a stranger far more than you can trust a wireless carrier or the government. In other words, the TAO will have a real hard time figuring out how to target you specifically. Any compromise will be treating you as a general target, not a specifically chosen one. Since you *are* treating this as an untrusted route, your real device is strongly protecting itself via firewalls and tunneling of all real communications across heavily encrypted connections. You face the same dangers with the device that you face at Starbucks.

      appear in the same area with the same volume of encrypted data

      That's extremely highly unlikely to have the same volume of data, and is trivially easy to randomize your total bandwidth usage.

      You better not be a Muslim or look at all like you originate from the middle east.

      Yeah, I guess not. However that has more to do with Donald Trump than anything else. There are millions of Muslims in the United States, and they live peacefully enough. I don't care what I look like to anyone.

      --
      Technically, lunchtime is at any moment. It's just a wave function.