Answer the question
In order to leave comments, you need to log in
How to implement secure and untraceable phone?
Hello.
Can you tell me what points to consider if I want to have a secure and untraceable way to communicate with a limited circle of people? Mostly calls via 3G + messages.
Key objectives:
- Unable to track the location
- Protection of the conversation itself
- Ease of use
Now there is such an idea, but I'm not sure about complete security.
1. Take a new smartphone, for example, iPhone (without a SIM card)
2. Use the Riot application (like the most secure dialer. I chose according to the protocol and encryption)
3. Internet via a 3G modem with a prepaid card (I hope you can’t establish a connection between the traffic of a specific subscriber and calls through Riot?)
Do you think such a scheme is reliable enough or are there more secure / convenient ways?
Answer the question
In order to leave comments, you need to log in
Just use the "elusive Joe" method.
Judging by the comments and answers - all the prerequisites are available
in the current realities - no way. it’s not for nothing that when they do something illegal, they take a disposable phone, a SIM card in the left name and make a call on the move (in the subway, on a bus, etc.), and then throw the phone away.
Don't use your phone. Learn telepathy, there are no more inquisitors, there is no one to be afraid of.
Do you think such a scheme is reliable enough or are there more secure/ convenient ways?
Unable to track location
You didn't say protected from whom.
And what does untraceable and by whom untraceable mean.
1 binding of the phone by name in the telephone network
2 even the OFF phone is tracked by the authorities. for example, I had such a story with a tax police officer when they were looking for a debtor, and just in a conversation at a smoke break with a security officer, they hinted that he was sick of it, he just turns off the phone. He says - "well, come with me", led him into a room filled with servers, pinged by phone number. The dude turned out to be ... across the road! He rented an office there, sat himself without touching anyone.
So if it's about security - see also my question How to make the most secure Jabber communication?
Don't need 3G.
Soap and washcloth, start over? How many times has this been asked...
Intruder model? So who do you want to protect yourself from? This is not an abstract question at all, because it determines both the resources that will be opposed to you and the capabilities of the enemy.
An absolutely protected phone is a phone without a SIM card with a battery pulled out :) Even a turned off phone maintains power - so that the clock does not fly off, for example. The goal of any defense is not to build an absolutely unbreakable system, but to make it meaningless to break it, when the data loses "secrecy" faster than the key is selected.
In your case, no way. The phone has an IMEI, which is registered by the provider when connected to the network. Even if the network is used as a transport layer, the fact that IMEI enters the network will be reflected in the provider's logs. Yes, the tracking will be quite rough - on the towers, but it will be :)
Protecting the conversation - well ... do you read the news? Either the Americans hacked into Whatsapp, then the FSB - telegram (they really wrote about the latter that it was a fake). So, if you need protection so much - order your development, perhaps the principle of "elusive Joe" will work
Convenience. What are you, what convenience? Convenience and safety are, in principle, orthogonal things to each other. The only more or less untraceable option is just with a disposable phone, which is in the river after each conversation. Expensive, troublesome, but more or less a guarantee that no one will contact, because tracking is just as troublesome.
Your weighty 5 kopecks: Order of the Russian Federal Security Service...
if you are in the Russian Federation - with this "desire" - you are violating this decree ....
What will it be? I don't know...
p.s. here is the article
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question