WikiLeaks's Edward Snowden is designing a tin foil hat for your iPhone to avoid tracking!
| Updated On: 2016-07-29 12:02:07.0 | Location :
As much as possible, the introspection system should be passive and difficult to detect by the phone�s operating system (prevent black-listing/targeting of users based on introspection engine signatures)
This is not a fun fact that your iPhone can be tricked into transmitting signals even when it’s off. That means they can easily track you. So to avoid this scene Snowden is coming up with a new plan.
Snowen is in joint work with famed hardware hacker Andrew “Bunnie” Huang to make an iPhone 6 case that can detect whether your phone is transmitting data when it’s not supposed to. The invention is to protect journalists, rights workers and the like from being tracked by governments and to expose their agencies’ efforts to spy on such people.
They published a paper related to this!
Front-line journalists are high-value targets, and their enemies will spare no expense to silence them. Unfortunately, journalists can be betrayed by their own tools. Their smartphones are also the perfect tracking device. Because of the precedent set by the US’s “third-party doctrine,” which holds that metadata on such signals enjoys no meaningful legal protection, governments and powerful political institutions are gaining access to comprehensive records of phone emissions unwittingly broadcast by device owners. This leaves journalists, activists, and rights workers in a position of vulnerability. This work aims to give journalists the tools to know when their smart phones are tracking or disclosing their location when the devices are supposed to be in airplane mode. We propose to accomplish this via direct introspection of signals controlling the phone’s radio hardware. The introspection engine will be an open source, user-inspectable and field-verifiable module attached to an existing smart phone that makes no assumptions about the trustability of the phone’s operating system.
- Completely open source and user-inspectable (“You don’t have to trust us”)
- Introspection operations are performed by an execution domain completely separated from the phone’s CPU (“don’t rely on those with impaired judgment to fairly judge their state”)
- Proper operation of introspection system can be field-verified (guard against “evil maid” attacks and hardware failures)
- Difficult to trigger a false positive (users ignore or disable security alerts when there are too many positives)
- Difficult to induce a false negative, even with signed firmware updates (“don’t trust the system vendor” – state-level adversaries with full cooperation of system vendors should not be able to craft signed firmware updates that spoof or bypass the introspection engine)
- As much as possible, the introspection system should be passive and difficult to detect by the phone’s operating system (prevent black-listing/targeting of users based on introspection engine signatures)
- Simple, intuitive user interface requiring no specialized knowledge to interpret or operate (avoid user error leading to false negatives; “journalists shouldn’t have to be cryptographers to be safe”)
- Final solution should be usable on a daily basis, with minimal impact on workflow (avoid forcing field reporters into the choice between their personal security and being an effective journalist)
Read more about the PUBLISHED NOTE