Does anyone know how this even works? Is the technology for this already in place?

  • markstos@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 year ago

    I’m not aware that either iOS or Android support this.

    I see two options:

    1. Apple and Google build requested backdoor access, which I don’t think they want to do.

    2. The police get physical access to the phone temporarily to install a hidden app on it. Possibly using an insider.

    3. Bad guys buy pre-backdoored phones from cops. See the ANOM story. https://arstechnica.com/tech-policy/2021/06/fbi-sold-phones-to-organized-crime-and-read-27-million-encrypted-messages/

    I have not read the bill but I’ll guess they are legalizing #2.

    • Hyperreality@kbin.social
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      DROPOUTJEEP … “A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

      https://en.wikipedia.org/wiki/ANT_catalog

    • NightOwl@lemmy.one
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      Yeah, if this can be done remotely then all smartphones by design are very insecure devices that shouldn’t be trusted to doing card transactions or entrusting with password management and two factor authentication…

      I wish they would go into more detail on the how of remote activation is made. Is it a law saying it is okay to do if it becomes possible? Is this through an exploit that was found and requires physical access to the device to initiate, or is it just a setting present on all phones by default.

    • slock@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      I’ve seen this news published at a few different places, and IIRC they plan to use already existing exploits. You can read a bunch about what could potentially be used on the grapheneos website, specifically on how the modem and cellular network stack is very highly privileged on android at least, and it is very likely that most cellphones are vulnerable to some kind of code injection via a stingray, for example.