📺 How To: Apply Thermal Paste (Increase 💻 CPU Performance / ⚕️ Life)

🗒️ CHANGING 💻 CPU THERMAL PASTE

One of the main drivers in a dying CPU is overheating.

Many ignore signs of hardware damage via overheating components.

Let’s change that today. This tutorial could add years to our CPU.


WATCH ON PEERTUBE


EXAMPLE: LIFTING KEYBOARD REVEALS CPU / HEATSINK / FAN

Your model may vary. Photos below feature an older Thinkpad in our example.

The same thermal paste application / advice applies, no matter what model of computer you are using. If you have a question, leave a comment.


📺 VIDEO:


GUIDANCE

Before applying the thermal paste, you will need to (partially) disassemble our computer (follow guide for your exact model).

The goal here is not for complete disassembly. Instead, our goal is removing the minimal number of components giving us access to the CPU / GPU (if applicable).

In my case (Thinkpad), I removed back underside screws to hasten removal of the keyboard.

Otherwise, I left the remaining front bottom screws (they were not in our way).

TIP: Take pictures along the way to ensure you use the correct screws / parts placement on reassembly.


Keyboard Removed (Your Model May Vary)

Once we have access to remove the heatsink + fan, we can begin to clean off the old thermal paste.


Flip Heatsink Upside Down To Observe (original) Thermal Paste

Above, we note the dryness of the thermal paste. This is (obviously) very old thermal paste, and needs to be replaced.

TIP: an overheating (or higher cpu / gpu temp) computer can be a sign it’s time to replace your thermal paste.


FROM OLD -> NEW THERMAL PASTE (SEE ABOVE VIDEO APPLICATION DEMO)

  • Remove the computer battery (if applicable)
  • During this process, clean any remaining dust / dirt off PC components
  • Scrape off most of the dried / old thermal paste with a plastic card
  • Clean remainder of old thermal paste residue using a cotton swab and rubbing alcohol
  • Apply the new thermal paste (“pea” size” is commonly mentioned);
  • I prefer to use a small amount and slightly spread it (as shown on video above)

Comments / Questions Open Below

📲 Flashing 🐧 Pinephone (more) Open Modem Firmware



WHY CHANGE FIRMWARE?

The (original) stock firmware is more bulky, including unnecessary items like sendmail (??).

One key benefit to running Biktor’s firmware: Pinephone owners have more control of the clockspeed, and thus, can tone down modem heat on the phone.


Read up on more reasons you may like to try this at Hackaday article.


MORE OPEN FIRMWARE

(above: Source)

It’s never been easier to install Biktor’s more open modem firmware.

There are a couple options for doing this.

If you choose the commandline (what I cover here), the ‘flashall’ script inside pinephone_modem_sdk, automates things nicely.


NEXT UP: fastest routes to having Biktor’s Pinephone modem firmware up and running.


FIRST MAKE SURE TO HAVE THIS ON PINEPHONE:

  • Mobian:
  • apt install android-tools-fastboot
  • OR apt install fastboot
  • postmarketOS / Alpine: apk add android-tools
  • Arch/Manjaro: pacman -S android-tools

(above prerequisite bullet list copied from HERE)


DISCLAIMER: Below I created a tutorial on ‘flashall’ method to get up and running with this firmware. I include 2 outside videos at the bottom for those who prefer GUI applications for upgrading firmware.

Modem recovery firmware available here, in case you mess up.

FLASHING MODEM FIRMWARE

Before following below, make sure to first install adb / android-tools. Required for ‘flashall’ script.

STEP 1: DOWNLOAD PINEPHONE_MODEM_SDK TO PINEPHONE

(ensure you have prerequisites mentioned above before beginning)

STEP 2: ENTER TO ‘HELPERS’ DIRECTORY (Commands Below)

COMMANDS (STEP 1 / STEP 2):

git clone https://github.com/the-modem-distro/pinephone_modem_sdk.git

cd pinephone_modem_sdk/

cd tools/helpers/


STEP 3: DOWNLOAD FIRMWARE PACKAGE INTO ‘HELPERS’ DIRECTORY

COMMANDS (STEP 3):

wget https://github.com/the-modem-distro/pinephone_modem_sdk/releases/download/0.6.8/package.tar.gz

(you can open above link in browser to save: another download to Pinephone option)


STEP 4: EXTRACT FIRMWARE PACKAGE INSIDE ‘helpers’ DIRECTORY:

COMMAND:

tar -vzxf package.tar.gz

chmod +x flashall

sudo ./flashall


(see below screenshot to see above commands in action. Make sure to download the package.tar.gz into the ‘helpers’ directory, to allow ‘flashall’ to make use of it.)

After this, you will notice the modem going ‘down’. Then it will reappear / come back alive (reboots).

If you get an error, it can’t hurt to try ‘flashall’ again.

Just be sure you have android-tools / fastboot, and extract Biktor’s firmware into the same directory as tools/helpers (the location of the flashall script).

When all is successful, you should see a message from a dedicated number telling you about the success of your new modem firmware.

Notice problems with modem disappearing? Take a look at recommended settings here.


UPDATE: OUTSIDE VIDEO GUI RESOURCES BELOW

In this article I opted to share a quick commandline route.

For those who prefer a GUI tool (to upgrade the firmware), below I embedded 2 videos on this.

Scroll down to take this route.


RELATED: FIRMWARE UPDATER ON POSTMARKETOS

(Below offers 2 separate videos on the same tool – watch whichever you prefer.)

VIDEO 1:https://www.youtube.com/embed/IsFbVZsQJX4

https://youtu.be/IsFbVZsQJX4 (Video Credit: Linmob)

VIDEO 2:https://www.youtube.com/embed/aokclNgnIbE

https://youtu.be/aokclNgnIbE (Video Credit: Martijn Braam of PostmarketOS)


SUPPORTING BIKTOR (FIRMWARE DEVELOPER):

[ Support Biktor ] [ Ko-Fi ]


Like this post?

Tired of downgrade attacks moving to 2G for malicious purposes?

You may find a simple persistent 4g-only service useful.
(open link / download in 🧅Tor browser)

Read more on the idea here.


🙂📱 Share Your Thoughts

🗞️ 📺 🐦 Twitter Whistleblower: Mudge

DISCLAIMER: video covers very recent whistle blower report.

Allegations still require looking into, and are not considered proof of “intent”.

Share the video / article.

Originally posted at BMAC Politictech Blog (posted here early)

TWITTER WHISTLEBLOWER: MUDGE (L0pht / cDc)

VIDEO COVERS:

What do I need to know?

What are the privacy implications?

How many employees have access to sensitive user data?

Were there user privacy compromises (this year) at Twitter?

Was SMS 2FA abused (this year) for mobile phone surveillance?

Who is this ‘Mudge’ guy? Why should we listen to him?


📰 FIND OUT THIS AND MORE.

📺 IN TODAY’S VIDEO:

(watch on 🧅 Tor Friendly, decentralized Peertube by clicking above image)


Watch Inside Post:https://www.youtube.com/embed/xS2jzX7Ace8


🔗 THANKS FOR SHARING (one way to support is sharing links on Social Media, Telegram…)


(below, I share screenshots I put created, underlining key points)

WHISTLEBLOWER REPORT HIGHLIGHTS IMPORTANCE OF ANONYMITY ON SOCIAL MEDIA:


EARLIER 2022 STORIES OF CONCERN

Firehose Data Allows Real-Time Tracking (2022)


Mitto AG Abused SMS 2FA For Mobile Surveillance (2022)


TIP: Use a dedicated email for social media accounts. Don’t use the same email or phone number you have connected to a bank, or “big tech” platform accounts. Every account sharing information can be neatly linked together.


🛡️ Twitter Introduces A New Phone Number Badge

This ‘badge’ will allow users to demonstrate they have a phone number connected to their account.

I see no problem with this, as long as phone numbers stay voluntary. Although it could potentially open certain users up (with this badge) to more likely attacks (earlier bug: phone number reveal).

Given information covered in the above video, requiring a phone number / identification would create a serious safety risk to activists, journalists, lawyers, and others in a sensitive position.

Not only does a phone number tie directly to a user’s identity (more reliably so than other means), it also opens them up to a host of new targeted “spear phishing” attacks.

The whistleblower report states up to 5,000 Twitter employees have access to sensitive user data. And, a Twitter employee was arrested for using their access to spy for the Saudi gov.

A country that executes its own dissidents.

There is no “safe” way for activists to share their phone number (or other personally identifiable information).

Email would make for far more secure form of 2FA, with an added bonus of protecting user identity, personal safety.

Regardless of the whistleblower report, I do hope Twitter remains a success. As long as it remains a place allowing free flows of information.

The only way this remains possible is if anonymous accounts are allowed to stay. As long as they are, I will continue to support Twitter over other mainstream Social Media platforms
(this way your data remains in your hands, depending on practices).


🧅 🔒 Twitter Now Has A Tor Hidden Service Onion Address

This one is a great move by Twitter. Nothing but good things to say about it.

Follow me on Twitter (onion), here.


TAKEAWAY:

We live in a world where power has become increasingly centralized…

🌎 A world where data contractors / monopolies can abuse access, power.

Simply Put: We simply can’t trust our personal data in the hands of strangers. No matter who they may work for.

When one has enough data, especially biometric data, one can use this in combination with AI, media, and various sensory applications / targeted experiences, to engineer future human behavior.

This is the very real future we are looking at. Don’t underestimate the power of data.


It’s why this page exists. Privacy (moreso anonymity) is vital to a free society, where people hold the power.

TIP: By proxying most of your internet data into mixnets, I2P / Tor (and newer options like Lokinet), you can make that data useless (instead of identifying).

Think of Tor as a haystack. Instead of the normal circuit your network packets route, Tor uses multiple layers of mixing / encryption to mix Tor browser client data into

In this world of increase, truly “free speech” cannot exist without the ability for anonymity.


💎 THANKS FOR SUPPORTING / SHARING THIS


Do You Think Twitter Really Fired Mudge For The Reasons They Stated?

NEXT: SHARE YOUR THOUGHTS

📲 Looking At Pinephone (Should You Get One?) 🐧

[ Peertube ]


The Take Home: Most people should not expect a Pinephone to replace their iPhone / Android.

The Pinephone is a niche device.

Who Should? For the few who love the idea of a Linux computer terminal in their pocket, more than they do a phone.

With a keyboard case, you can achieve over a full day of battery, carrying an additional 6,000 mAh charging battery. Placing your Pinephone into the keyboard case, allows it to attempt to charge via the pogo pins.

(there are some drawbacks to the keyboard case: you have to be careful not to attempt to charge the usb-c on the Pinephone, while it is plugged into the keyboard case)

Outside that, I would only recommend to the most hardcore of Linux nerds. Those who want to be part of the Linux mobile development process.

Too many Android users expect the same performance, apps, battery life… those people are surely to be disappointed.

On the Linux end, most apps you run on your desktop can run on the Pinephone.


On the other hand, without Pine64 creating an affordable Pinephone (original) project, we would not have near as large a Linux mobile community.

Purism also has played a big role in Linux mobile development, with Phosh (interface shown in video).


Should you get the Pinephone?

This is something only you can answer for yourself.

If you have no interest in development process, it’s probably not for you (at this point).


Pinephone has been my daily driver for 2 years now.

🐧 Distro Hop: Manjaro XFCE (Minimal) Migrating SSH Keys (From Tails), Unlock LUKS Crypto..

(originally posted on BMAC Blog, where posts are organized by category / searchable + Support options)

Hello everyone, 👋 🙂

LATEST VIDEO:https://www.youtube.com/embed/NKNX5GxaPUc

It’s been over a month of dedicated TailsOS usage (due to main disk dying some bit ago).

I enjoy Tails, will continue using it (as with Debian, Whonix, Qubes, Arch).

But given restrictions found in privacy / anonymity focused operating systems, sometimes we need a longer term solution for working more productively (without driving ourselves crazy).


TODAY’S VIDEO

Decided to do a bit of ‘distrohopping’.

Installed Manjaro with (minimal) XFCE desktop. Downloaded XFCE ‘minimal’ image to try to make better use of older hardware.

Continuing to bring solutions and setup tips for all Linux distros (including Pop!OS).

Ubuntu has always been a tad heavy.

And so, nothing changing here. Will continue introducing ways you can customize your system in ways that protect your privacy, security. No matter the distro you run.


TRY XFCE

Ever get the urge for a full GNU/Linux desktop experience, on a lighter, faster level?

You may like to try XFCE.

Sure, it’s not the ‘lightest’ of all, but certainly lighter than KDE / Gnome.


SCREENSHOT:

This screenshot was taken the day of installation. Nothing has been changed. Wanted to capture the “post install moments” screenshot.


Always been a favorite of mine. XFCE desktop is actually what I’ve run most my years with Linux.

If you run Pop_OS (or any other distro), you can easily install XFCE.

Try XFCE for yourself!


Why Try XFCE?

  • When you add XFCE, it doesn’t automatically delete your old desktop!
    (you aren’t losing anything – as long as you don’t choose to remove your current)
  • After installing XFCE there is usually an option to select it at your login screen
  • It’s lighter than alternatives like KDE / Gnome
  • Nice option for older machinesThe great thing about Linux: tips here can be pretty universal. Sure, a few package manager commands are slightly different, but it’s generally a matter of either “apt” (Debian), “pacman” (Arch), or “dnf” (Fedora / Redhat / CentOS).

(I try to include command conversions on important tutorials)


TIP: Try out a lightweight XFCE desktop. No matter your operating system, XFCE is likely available.

Simply search your package manager (graphical or commandline) for xfce4, as a start.

Pop_OS / Debian: apt update && apt install xfce4

Manjaro / Arch Based: pacman -Ss xfdesktop

(if any of the above commands are wrong for your system (or you have trouble) comment)


Thanks for following and sharing this on Social Media, Telegram, everywhere.

Help beat the (rigged 😁) algorithm.


Problems Installing XFCE?

Leave Comment / Question:

💻 How Common: Backdoored 👾 Hardware? History + Recent Cases

Post may be updated with new relevant information.

🔗 Share on Telegram, Social Media


(click image below to watch latest on (🧅Tor Friendly) Bitchute)

(Click Above Cover Image To Play Latest Video) [ 🧅 Tor Browser Friendly ]

[ Watch On Peertube ] [ 🧅 Tor Browser Friendly ]


Thanks Latest Coffee Member Faros.

Also thanks to PL, T., G.

(options on frontpage.)


SUMMARY

Covers various (historical + present) backdoors found in hardware (including this week’s latest Asus motherboard UEFI firmware backdoor:”CosmicStrand”).

Important for both indivduals, gov, and small businesses to be familiar with the risk.

It doesn’t mean all ‘backdoors’ (ex: test accounts) are put there for ill intentions. Large networks require remote access, and server management.

It’s nothing new.


Intel AMT Briefing

Many are still unaware (most) computers come with 👾 Intel AMT (active management tech), a proprietary, remote access backdoor (has legitimate purposes, but by definition, acts as backdoor).

There are legitimate purposes, but functions mirror that of a hardware backdoor implant.

Computers with ME, can’t hold power without it: removal by design is very difficult (if not impossible – depending on hardware), remote access hides from PC owner’s purview). If you attempt to remove it completely, your PC will not power on for long.

HAP Bit

‘HAP bit’ (see me_cleaner), once set, partially ‘neuters’ Intel ME. Reportedly a solution for agencies who needed to meet the bar for a “high assurance platform” (HAP bit does not work for all models).

‘Normal’ customers are generally left with no choice in newer Intel with AMT / vPro model computers.

Newer computers are completely dependent on Intel ME co-processor. Remote communication OOB (Out-of-band), being most concerning

Why so few options for Intel models without? It’s worth asking.


Others might not be aware of servers (ie: cloud rental) having 👾 IPMI BMC hardware with remote OOB (out-of-band) access: in truth, this should be expected for large server mgmt – make sure you trust your providers. But it’s still not common knowledge to the average person, so I mention it.

What about 👾 Computrace? Familiar? Aware of Lojack? Computrace is another ‘backdoor’ styled security feature, covered in the video. It looks, acts, and feels like a backdoor for those performing system analysis (as the video shows).

Learn about the above and more, in today’s latest video.


(support original content: options – sharing, reposting links to content is the best way)


Could there be additional persistent undocumented features inside ISP routers?

You could like the idea of a simple, single board computer for routing at home, and at the office.


Avoid ISP routers – many problems over time, new innovations can add attack surface. Find another router (router advice towards bottom).

INFO: ISP’s in USA since 2017 have been legally allowed to sell customer data / identifiers “without explicit consent.” Other countries may vary in their data protection, but (in my option), we should assume abuse of this exists in the data broker industry.

(not all ISP’s reported to do this)


TIP: encryption helps prevent (potential) malicious redirection of personal devices.


DETAILS / MITIGATION EXAMPLE

Blocking hardware related backdoors locally (from local OS) won’t likely result in a plausible solution.

RING LAYERS AND SCOPE

The rings represent layers of privilege. Kernel, at the center (below), has access to everything outside of it. Repeating per ring.


Take Intel Hardware Example Here…

INTEL MGMT ENGINE RING LAYER (-3)

Additional rings add privileges that otherwise wouldn’t have existed, for ME, at Ring -3.

Meaning it has privileges over everything outside of it.

Intel ME runs at highest privileges, completely outside oversight (ie: Windows, Linux).

Learn more on rings on Intel hardware, here.

[and see: Intel MGMT Engine Post]


MITIGATION

In some cases we may be able to mitigate, through a series of creative choices (where possible).

Use information you have on backdoor pathways / communication to mitigate on LAN.

One mentions in this example (see video): AMT requiring either built in Intel AMT capable ethernet, and / or Intel WiFi with OOB / TCP / IP stack. Otherwise an AMT capable device.

Alternative connection methods can become one of those mitigations.

Another option (depending on the backdoor location, access) would be reflashing (where applicable).

Firmware

More Intel AMT options collected for the community, see: This Post.

Router Advice

I have been asked “what router to get”? Routers play a key role in home / business security. Devices will be guided, (“routed”) by your router. They can (also) be redirected (maliciously) by a router.

Choose carefully.

On the hardware end: if you aren’t DIY, and want something “ready to go”, see hardware reviews, search relevant vulnerabilities.

Sometimes a backdoor is not necessarily placed intentionally. It could be a single rogue employee, or other placement between you and the manufacturer.

Also: Watch out for counterfeit routers.

ex: July 2022: Arrest in scheme to sell Cisco Counterfeit routers – Florida Story

“Cisco Partners Sell Fake Routers To Military” Read Story Here

If you choose to buy a new router, 2 established projects trusted in the FOSS Community are Open-WRT firmware and PF Sense (FreeBSD based). Both provide controls for networking (read reviews; do a bit of vulnerability searching on hardware).

TIP: reputable hardware vendors, with strong FOSS community backing are your safest bet when looking at mass manufactured hardware.

(see if they have a forum; look for reviews inside FOSS community)

Or, you might choose flash one yourself. Either a single board computer, or one supporting
Open-WRT firmware / PF Sense, or other choice.


related: Working on improvements to router related img. Sometimes shared with followers as a “surprise download”, or “thank you” to regular supporters (work in progress).


Share your suggestions, by comment, or email.


Have Backdoor Experiences On Hardware / Software?

Share In The Comments

💻 Argon One M.2 Case: Migrating 📁 SDCARD Server To SSD Board

Earlier we introduced the Argon One case and add on SSD board for the Raspberry Pi:https://www.youtube.com/embed/UiZV76_cjWU

Today we covered how to migrate our Raspberry Pi servers from the less reliable Micro Sdcard, over to a faster, much more reliable SSD.

Offering us a long term selfhosting solution.

Here I discuss one of my quick methods for transferring the entire Pi server from sdcard to SSD board:https://www.youtube.com/embed/ZawFE6p_fXM

There will be a followup talking over the final Argon One case setup.


This case + SSD board is an excellent option for those interested in selfhosting Nextcloud, or other personal servers.

See my Selfhosting Playlist for more ideas, including a personal tip on beginning your Nextcloud as Hidden service, a shortcut.


Added Note: The Argon One is also a recommended solution for those who get the Supporter Privacybox img. This ‘privacybox’ img includes fully automated custom setup for your brand new Nextcloud as Tor Hidden Onion Service (with added anonymous chatroom options). Including generation of a new Onion address + private key, as well as your own Privatebin “zero knowledge 256bit AES encrypted pastebin” (and more, coming soon).

Learn more about the supporter image at the Gitea onion here (open link in Tor Browser). This image is currently existing as a present to thank Supporters who buy 6 ☕☕☕☕☕☕ total coffees over any period of time (or equivalent donation in anonymous Monero and / or Cashapp).

It’s a concept to help support my demonetized tutorial / public interest work, and will continue to incorporate new original design concepts in the setup.


Thanks for watching and be sure to share this video with others interested in learning about selfhosting! 🙂 I appreciate your help sharing any of the videos you find helpful.

Looking forward to helping everyone learn more about selfhosting and running your own servers, coming up.

We will also be taking more looks at Linux and Pinephone in next few videos. Stay tuned and be sure to Follow here for the latest in tips and tutorials.

Feel free to leave questions and comments. Look forward to reading them.

🔍 OSINT + 🔎 PRIVACY: “The Internet Is Forever” (Internet Archive / WayBack Machine)

Click image below to watch the latest video on Peertube (mirrored more places later on)

[ Peertube ] (🧅 Tor Friendly)

[ Bitchute ] (🧅 Tor Friendly)

Post may be updated later with additional information / screenshots. Check back if interested.


Internet Is Forever?

The level of “The Internet Is Forever” is real (here).

I’m hoping some of you find this resource helpful.

And If you haven’t heard of the “Internet Archive” until today, even better.

Searching

https://web.archive.org/web/*/EnterYourWebsiteHere – show all captures

Internet Archive Video, Bitchute.com/yourprivacytv (my channel)


LINKS

Internet Archive (WayBack Machine, Read Books, Movies + More)

WayBack Machine (Advanced Search)

Internet Archive Under Attack (Blog post)


Please Do Share This! (+ Don’t Forget To Follow)

❤️ Support Options (Full List) On Frontpage (Thank You For Supporting original content)

📲 “Hey, Get The App!” — 🔒 But Should You? 🤔 (+SOLUTIONS)

(originally posted on bmac July 25th, 2022 (where posts organized by category, are searchable by title)

But is an App the RIGHT choice… for everything?

Thanks for following along (thanks to those sharing links to videos / tutorials).

Every company wants us to “get the app“…

But is the app the RIGHT choice… for everything?

Should you REALLY get the app? (probably no 😛)

Is the App:”Just trying to offer new features / help“? Or seeking new paths of access for information gathering? In most cases, there are no additional features on the app compared to the website.

(So why get the app? 🤔)


Should You “Get The App”?

Answer: depends.

We know various apps track us (numerous techniques).

SUMMARY: DO NOT GET THE APP

  • Compared To Permissive Apps, Privacy Can Be Improved In Browser
    Accessing Services Through Apps Adds Variables:
  • Apps request unnecessary permissions (beware: some apps even have permission to modify other permissions)
  • access to sensitive parts of the phone– microphone, camera, pictures, files, SMS text messages…
  • Apps with microphone access communicate using hidden ultrasonic sounds- SmartTV’s come with a microphone – television broadcasting may communicates with apps on your phone (using combined speakers and microphone access)

APP DANGER: ULTRASONIC TRACKING

Beware apps that request microphone access without actually “needing” microphone access (ulterior motives likely at play… from recording conversation, to ultrasonic tracking)

STORY: 234 Android Apps Requiring Microphone Access Were Identified To Be Listening For Ultrasonic Beacons Constantly, Without User Knowledge (Braunschweig University of Technology in Germany). READ THE STORY HERE


CONSIDER. . .

Tor, I2P, Lokinet, may be tools offering protective measures for privacy online…

But, have you considered the risk of coordinated ultrasound (tracking through methods humans are unable to detect via senses)?

Running Tor Browser (ie: with Javascript enabled) could be sending hidden tracking beacon communications to your Android phone apps (remember the ones asking for microphone permissions? 🤫), coordinating to compromise user anonymity.

TIP: Tor Browser On “Safest” Mode When Anonymity Is Key (if not, at least disable javascript where possible).


When To Get An App?

Consider a financial app (for example) may be designed with additional security features, vs normal web browser..

This is where an (isolated) App could be a better option (isolate app maximally)

Outside that, we should focus on finding privacy friendly FOSS alternatives, where we can.


Avoid Apps:

  • That exist to collect permissive access for major corporations
  • That offer website access (allowing you to control browser environment
  • Where you cannot control app permissions
  • Where a FOSS alternative is viable

Browser Risk

  • MiTM (browser redirection, browser hijack (bettercap, BeEF toolkit).
  • Not everyone will catch a browser attack in the act (ie: phishing)
  • Not sandboxing leads to tracking (a sandbox’ allows you to run something inside controlled environment space, separated from sensitive system files and hardware)

What To Install

  • If Android / iPhone user, install only apps you really need (take advantage of transparent, FOSS licensed apps where possible to meet needs)
    Example: consider an open source internet radio app, instead of alternative music apps pushing for many permissive requirements
  • Apps can be are our greatest privacy risk (some have access SMS txt messages, photos, calls, cameras – many sell your location data)
  • If you have a dedicated PC you feel trustworthy, accessing personal services via this device can be ideal.
  • try sandboxing for personal services (browsers offering this / Bubblewrap / Firejail)-allows you to choose if you wish to share your identity and other interests / browser history

SOLUTION: Old Smartphone / Tablet Device For App Isolation

Install apps on old Android tablet / phone (as I have been doing last few yr for ‘work’ related apps)
I have one Android I have used for recording video / photos.Another one is dedicated to apps I don’t trust (isolating access, data from the app)

This may be a potential solution for you if you have old smartphones with no sim card.

TIP: Reset phone to factory FIRST. This ensures no old data connects you to it.

If using standard Google based Android, setup with a BRAND NEW gmail account, connected to nothing associated with you.

(Android with Google asks for your gmail address to sync. By using the brand new gmail account, nothing connects back to you)

For those able, another flashed Android OS is an option.SOLUTION: Separate Data Using Containers (Librewolf [Firefox Fork] Pictured)

Utilize built in containers inside a browser like Librewolf, a privacy focused browser based on Firefox:


Linux Users SOLUTION: Sandbox Browser Sessions With Firejail:

Run Firefox Inside Temp Dir (restricts access outside):

firejail –private firefox

Run Firefox With Dedicated Sandbox Directory:

firefox –private=/home/Justin/ffpersistent firefox


Changing habits (including apps with access) is among the most important steps to protecting ourselves online.

Share and Question Everything. Thoughts Welcome.


(original tips + writing is Supported by those sharing posts, video + coffee ☕ ❤️)
Grateful to Support.

🔐 Smartphone: “IMSI Catchers” (Thoughts + Mitigation)

Note: restricting to “4G only” may not be right for everyone. If it negatively affects service, you can disable with:

systemctl disable 4g-only.service (if service is affected in your area).

Tips for common, 2G / 3G. 4G cell site simulators exist (active, less common).

Originally shared on bmac June 21st, 2022.


Hey friends, 😀

Today let’s talk a bit about what are commonly referred to universally as: “Stingrays” (popular model), and for Linux phone (Pinephone tested) users, sharing a small service for “4G Only” persistence (every boot): here).

Why? After noticing downgrades, wanted to see if it will affect my service over the long run (good coverage). Opted to try “4G only” for a while.

4G only restricts 2G / 3G and could cause service interruption during moments lacking 4G availability.

Includes tips for Android users. iPhone, not having as many options, does carry a “4G Only app“.


Cell Site Simulators (examples: “Stingrays”, “IMSI Catchers”): False Cell Towers appeal as “strongest signal in the area” for phones in nearby area (ex: 10,000 phones per device in some cases). Once connected, phone location can be tracked, and on lower security (ex: 2G), SMS / calls can be more easily captured)



SUMMARY: most Cell Site Simulators rely on downgrade attacks to cause your phone to connect to the less secure (encryption) 2G services (and other times 3G). We talk about how to mitigate for Linux phones (Pinephone service), Android, and iPhone (briefly).


INTRODUCTION

Video (older) introducing an Android tool for detection and mitigation of “cell site simulators”.

A basic introduction to what these devices are designed to do (mimic cell towers), and what various models may look like (including homemade), from the smallest (fitting in the palm of the hand), to the flying…

Watch Here:https://www.youtube.com/embed/w8reJoOl5fM


RELATED VIDEO: Top 11 Android Privacy Tips


Tracking With Cell Site Simulators

Essentially functioning as false towers.

If You Have A Phone…

it will eventually fall into this surrounding net…

These devices can scoop all phones in the area. Some reportedly handle 10,000 phones in vicinity, at a time.

Common in midst of a protest (examples, further down).

We all deserve the right to privacy in our home, and inside our most personal devices.

Privacy represents the most fundamental Human Rights (no right guaranteed without right to privacy)

Companies producing Cell Site Simulators have:
non-disclosure agreements


SIM CARDS: SILENT SMS + MORE

While we are talking smartphones, it’s best to include SIM cards in the mix.

Did you know your SIM card carries its own microcomputer, runs its own OS and browser, and accepts hidden binary text messages?

You can learn more about this on our video, here:https://www.youtube.com/embed/U4h6YuDxmLo


CELL SITE SIMULATOR MITIGATIONS

Downgrading phones to 2G service makes content easier to intercept (ie: calls and SMS txt, due to weak security in the 2G).

4G Cell Site devices run more expensive (comparing to 2G / 3G), generally offering location tracking.

Previously, price quotes (released a couple years back) marked “Hailstorm” devices for over $450,000.

Ultimately, for both criminal and official purposes, most rely on “downgrade” attacks.

Some may notice 4G blocked during certain areas of protest.


See: here, here, and here as examples where 4G was blocked during protest. Nearly all serious protests deal with this, (possibly) forcing connection to cell site simulators.


VULNERABILITY: SYMPTOMS OF ATTACK (Then Again… There Aren’t Always Signs)

  • Quicker than normal battery drain (push max battery usage)
  • High power usage forced on phones (amplification can allow farther operation distances)
  • Downgraded service to 2G, 3G (from stable 5G, 4G)
  • Service disruptions (problems sending SMS txt, calls, internet)We should ask ourselves: Why is there no tower provider authentication, to protect our phones from these devices?
    If providers desired so, it would be so.

Why Do Downgrade Attacks From 4G To 2G, 3G Happen?

Downgrade attacks occur to move phones to a more ‘receptive’ environment.

  • 4G Cell Site Simulators (pricey)
  • 2G, 3G offers lower security capabilities (ie: receiving calls / SMS txt)

Use To Our Advantage?

Since said false malicious cell spy towers utilize downgrade attacks to force all phones in the area to connect to their malicious cell site simulator…

We can attempt to mitigate downgrade attacks by forcing 4G only (keep in mind not all settings are saved after reboot – that is the idea of trying the 4g-only service for the Pinephone service: it forces 4G/LTE only, each reboot)


ANDROID USERS: SETTING 4G / LTE ONLY

  • Open Dialpad
  • Dial: * # * # 4 6 3 6 # * # * (this opens testing window)
  • Go into “Phone Information”
  • Set Your Preferred Network Type To LTE Only for 4G only (keep in mind this settings holds until reboot)

iPhone Users: 4G / LTE Only There is a reported 4G only app.

You can also access iPhone service options by following this page.


Pinephone / Linux Phone Users

Today I am writing today to intro a small example “4G Only” Service.

It’s something I wanted on my Pinephone (Linux phone) to prevent downgrade attacks.

Symptoms Of Malicious Intent

  • Phone jumps from its reliable 4G, down to 2G, or 3G
  • Phone has service disruption after this connection change
  • Internet may lose reliability, texts and calls may show issue / stalling

Apps like Android’s “Cell Spy Catcher”: take 24hr to map out all current cell towers (and locations), alerting you to towers which move or behave suspiciously, such as changing tower information, and location (ie: true cell towers are not moving around, changing location 😤)


RELATED STORY: In some areas, attacks could even be of foreign interests, even criminal networks.

See Example: IMSI Catchers found planted on Whitehouse grounds
(said to be of foreign origin – details in article)

Mitigation (For Most Cases / Devices): Force 4G Only.

Sure, settings in the Gnome / Phosh allow you to momentarily selecting 4G only, issue here is, it resets to allow 2g, 3g, 4g on the next boot. This service ensures 4G is the only available service to the modem (during service downgrade attempt).

Setting Up 4g-only Service

The service is simple to setup.

Simply download / clone package from Gitea onion (use torify git clone, or Tor Browser to view and download), and run the install.sh script (using sudo). This moves everything where it belongs, making a new command in our execution path, and enabling the service (by default starting 1st on your next reboot).

If you would like the service to start right away, you can run the command installed:

sudo 4g-only

Or (once running install.sh), you can start the service without reboot by issuing:

sudo systemctl start 4g-only.service

To avoid having to reboot.

What Does It Do?

First detects your current modem location (does change), setting “4G / LTE Only” for that modem, every reboot.

Running:

sudo 4g-only

forces 4g-only from the commandline.

If you need access to 3G as well, there is a single argument:

sudo 4g-only reset

Personally, I recommend 4G-only (not the reset) to prevent connection to these lower services linked to most malicious cell site simulators (note: during downgrade attack you may lose service – but at least you may know why..)

Checking Status Of 4g-only.service

Once installed (after a reboot), you can check the status of 4g-only.service.

sudo systemctl status 4g-only.service

Once you have run the install.sh, you will have 4g only every single boot 100% of the time.

If you need access to 4G + 3G (not recommended for most areas), I added the ability in the systemctl ‘stop’ command of the service.

And so:

sudo systemctl stop 4g-only

Won’t just allow 3G, it keeps 4G preferred.

But for myself, and most people, I do recommend leaving the service as is, allowing 4G Only (not including 3G), if you wish to mitigate downgrade maximally.

If you notice service disruptions on 4g Only, this could be a sign of downgrade attacks. That alone IMHO, can be useful to know.

Will share more options as tested in future (check back).

Hope you find useful. ❤️ 📱 🐧


🙂 Thanks for following this page and spreading the word!

Be sure to share this post everywhere!



Support options ☕ (original tips / writing supported by coffee, crypto, cashApp)