D
D
Donut2017-02-05 20:45:35
Computer networks
Donut, 2017-02-05 20:45:35

How to implement secure and untraceable phone?

Hello.
Can you tell me what points to consider if I want to have a secure and untraceable way to communicate with a limited circle of people? Mostly calls via 3G + messages.
Key objectives:
- Unable to track the location
- Protection of the conversation itself
- Ease of use
Now there is such an idea, but I'm not sure about complete security.
1. Take a new smartphone, for example, iPhone (without a SIM card)
2. Use the Riot application (like the most secure dialer. I chose according to the protocol and encryption)
3. Internet via a 3G modem with a prepaid card (I hope you can’t establish a connection between the traffic of a specific subscriber and calls through Riot?)
Do you think such a scheme is reliable enough or are there more secure / convenient ways?

Answer the question

In order to leave comments, you need to log in

11 answer(s)
D
d-stream, 2017-02-05
@d-stream

Just use the "elusive Joe" method.
Judging by the comments and answers - all the prerequisites are available

I
iBird Rose, 2017-02-05
@iiiBird

in the current realities - no way. it’s not for nothing that when they do something illegal, they take a disposable phone, a SIM card in the left name and make a call on the move (in the subway, on a bus, etc.), and then throw the phone away.

D
Dmitry, 2017-02-05
@TrueBers

Don't use your phone. Learn telepathy, there are no more inquisitors, there is no one to be afraid of.

N
nirvimel, 2017-02-06
@nirvimel

Do you think such a scheme is reliable enough or are there more secure/ convenient ways?

Many people got burned on this. People are so accustomed to surrounding themselves with comfortable things that they do not understand that their convenience can sometimes be simply incompatible with safety.
Why hide behind a basin in the bath if it is more convenient to wash without it?
Так многие думали пока за мылом не нагнулись.

Real-time conversation (no matter with what encryption and through how many tunnels) allows you to match two subscribers with each other based only on the fact that they start and end a conversation at the same time! This little thing is often enough to identify the connection between two subjects who were in different countries with different operators and used different communication technologies (GSM/Skype/SIP) using logs (many years before). And this is not solved by using any miracle software or any encryption technologies. This is a fundamental, unrecoverable shortcoming of real-time communications. The only solution is to completely abandon real-time communication and return to using the good old mail (e-mail, of course), which also has many security problems, but they are at least

I
index0h, 2017-02-05
@index0h

Unable to track location

In principle, you do not understand how mobile communications work, this is sad. There is an option with the help of walkie-talkies and predetermined frequencies.
Encryption, there are applications for mobile. Many walkie-talkies are able to encrypt.
Buy a phone, buy a disposable SIM card, talk on the road, throw away the SIM card, throw away the phone.
)) hope))
Protections that cannot be hacked do not exist, from the word "absolutely". The goal of any defense is to make it unprofitable to break it.
It all depends on who you are protecting.

B
Boris Yakushev, 2017-02-05
@za4me

If you ask such an answer on a toaster - no way.

Y
younghacker, 2017-02-06
@younghacker

You didn't say protected from whom.
And what does untraceable and by whom untraceable mean.

L
lukoie, 2017-02-06
@lukoie

1 binding of the phone by name in the telephone network
2 even the OFF phone is tracked by the authorities. for example, I had such a story with a tax police officer when they were looking for a debtor, and just in a conversation at a smoke break with a security officer, they hinted that he was sick of it, he just turns off the phone. He says - "well, come with me", led him into a room filled with servers, pinged by phone number. The dude turned out to be ... across the road! He rented an office there, sat himself without touching anyone.
So if it's about security - see also my question How to make the most secure Jabber communication?
Don't need 3G.

D
Dimonchik, 2017-02-05
@dimonchik2013

wifi instead of 3
and android

C
CityCat4, 2017-02-06
@CityCat4

Soap and washcloth, start over? How many times has this been asked...
Intruder model? So who do you want to protect yourself from? This is not an abstract question at all, because it determines both the resources that will be opposed to you and the capabilities of the enemy.
An absolutely protected phone is a phone without a SIM card with a battery pulled out :) Even a turned off phone maintains power - so that the clock does not fly off, for example. The goal of any defense is not to build an absolutely unbreakable system, but to make it meaningless to break it, when the data loses "secrecy" faster than the key is selected.
In your case, no way. The phone has an IMEI, which is registered by the provider when connected to the network. Even if the network is used as a transport layer, the fact that IMEI enters the network will be reflected in the provider's logs. Yes, the tracking will be quite rough - on the towers, but it will be :)
Protecting the conversation - well ... do you read the news? Either the Americans hacked into Whatsapp, then the FSB - telegram (they really wrote about the latter that it was a fake). So, if you need protection so much - order your development, perhaps the principle of "elusive Joe" will work
Convenience. What are you, what convenience? Convenience and safety are, in principle, orthogonal things to each other. The only more or less untraceable option is just with a disposable phone, which is in the river after each conversation. Expensive, troublesome, but more or less a guarantee that no one will contact, because tracking is just as troublesome.

T
Tom Nolane, 2017-02-06
@tomnolane

Your weighty 5 kopecks: Order of the Russian Federal Security Service...
if you are in the Russian Federation - with this "desire" - you are violating this decree ....
What will it be? I don't know...
p.s. here is the article
BJZ_rPzcGb4.jpg

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question