summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDenis 'GNUtoo' Carikli <GNUtoo@no-log.org>2016-03-28 20:50:31 +0200
committerPaul Kocialkowski <contact@paulk.fr>2017-06-11 16:22:22 +0300
commit04e90f79955f8082a76ecff414fea21b08174500 (patch)
treea31c6cfe5d4c0a5380f0cd37a28b0b849e91a832
parent442e7f4d0ca35a2f920100420da49575b63ec2af (diff)
downloadreplicant_website-master.zip
replicant_website-master.tar.gz
replicant_website-master.tar.bz2
freedom-privacy-security-issues: Improve the modem isolation descriptionHEADmaster
Signed-off-by: Denis 'GNUtoo' Carikli <GNUtoo@no-log.org> Acked-by: Paul Kocialkowski <contact@paulk.fr>
-rw-r--r--freedom-privacy-security-issues.php7
1 files changed, 4 insertions, 3 deletions
diff --git a/freedom-privacy-security-issues.php b/freedom-privacy-security-issues.php
index b7364dc..0190315 100644
--- a/freedom-privacy-security-issues.php
+++ b/freedom-privacy-security-issues.php
@@ -65,9 +65,10 @@
Despite this situation, the modem remains a crucial part for privacy/security: it is nearly always connected to the GSM network, allowing for <a href="//www.gnu.org/philosophy/malware-mobiles.html">remote control</a>.
The modem can be more or less damaging to privacy/security depending on what hardware it has access to and can control.
That is to say, how isolated it is from the rest of the device.<br /><br />
- A device with bad modem isolation would allow the modem to access and control key parts of the hardware, such as the RAM, storage, GPS, camera, user I/O and microphone.
- This situation is terrible for privacy/security as it provides plenty of ways to efficiently spy on the user, triggered remotely over the mobile telephony network.
- Those are accessible to the mobile telephony operator, but also to attackers setting up fake base stations for that purpose.
+ A device with bad modem isolation cannot prevent the modem from accessing and controlling key parts of the hardware.
+ For instance the main CPU's RAM, its storage, the GPS, the camera, user I/O and the microphone.
+ This situation is terrible for privacy/security as it provides plenty of opportunities to efficiently spy on the user, that could be triggered remotely over the mobile telephony network.
+ That mobile telephony network is accessible to the mobile telephony operator, but also to attackers setting up fake base stations for that purpose.
<a href="images/freedom-privacy-security-issues/good-modem-isolation.png" data-lightbox="current-situation" data-title="Good modem isolation"><img src="images/freedom-privacy-security-issues/good-modem-isolation.png" alt="Good modem isolation" style="width: 250px; float: right;"/></a>
On the other hand, when the modem is well-isolated from the rest of the device, it is limited to communicating directly with the SoC and can only access the device's microphone when allowed by the SoC.
It is then strictly limited to accessing what it really needs, which considerably reduces its opportunities to spy on the user.