• 6 Posts
  • 120 Comments
Joined 19 days ago
cake
Cake day: March 19th, 2025

help-circle








  • As you noted in another comment, your IMEI number is out and it has already been mapped to your current location. Which means if you travel with this device and security is tight enough, in theory they will be able to find out where you live. They will then probe for associated metadata from there.

    Other than that, there’s not much risk as far as I can tell. Clear your list of WiFi networks before you travel and hope Google’s firmware for their modem isn’t spyware (it likely is though, Qualcomm made it).


  • If you want no cellular tracking: remove SIM, disable eSIM, switch on airplane mode and disable WiFi-calling if not disabled already.

    Yes unfortunately your device has already been “fingerprinted”, but with MAC randomization and GrapheneOS’ work on preventing apps from checking software and hardware identifiers, I think you’ll be fine unless you’re going against the NSA. You shouldn’t be using a phone if you’re up against multiple 3-letter agencies





  • Thank you for your comment. Your response had me thinking for a while, and yes I think you uncovered it: I had a theoretical idea without actually considering the practical outcome.

    I do not have a 3-letter agency targeting me to my knowledge. I quickly realised that sending signals over VOIP is a bad idea, I won’t be doing that.

    You are again correct: I run Debian as my daily driver, and it would be foolish to not consider my computer to have been compromised already. I have removed the built-in camera and microphone but I haven’t attempted to clean out Intel ME from my system.

    All of this makes my question look pointless since there’s already so many attack vectors. In which case, I’d be interested in your opinion in physically cutting off attack vectors from an Android phone as an academic question.

    Thank you for the wonderful comment.