V
V
vyn2017-04-14 03:20:40
Information Security
vyn, 2017-04-14 03:20:40

Phone protection from wiretapping. How?

Good afternoon! Suppose a subscriber of some mobile operator is listening. What protection options does the subscriber have?
I would like to clarify the question. If SORM is excluded, how can an individual gain access to negotiations?

Answer the question

In order to leave comments, you need to log in

6 answer(s)
F
fatalick, 2017-04-15
@vyn

A legally private person cannot access telephone conversations in any way. In fact, excluding SORM and unscrupulous OSS employees, there are two ways:
1. Either malware on the phone or outside interference in the device itself. There may be a "bug", and software that has gained access to the microphone and broadcasts the audio stream to the attacker, and it doesn't matter how and how the voice is encrypted further.
2. Or interception of GSM traffic, which is most likely not economically feasible.
Therefore, the protection of the subscriber's confidential information can be reduced to the protection, physical and software, of the mobile phone itself.

Y
Yuri Chudnovsky, 2017-04-14
@Frankenstine

There is exactly one option - do not use voice calls / SMS. Use encrypted communication channels such as skype/vider/watsup/telegram/etc, depending on which one you trust more.

V
Vladimir Kuts, 2017-04-14
@fox_12

Agree in advance on the system of allegory. And use it. For example - "the bird flew out of the cage" - the onset of a certain event. Or there "Aunt Klava will go to the doctor at 14:30" - an appointment for a certain time. And about the time, you can also agree that you always indicate with a shift of 3 hours, for example. etc.

S
sgd, 2017-04-14
@sgd

https://ru.wikipedia.org/wiki/Scrambler

C
CityCat4, 2017-04-14
@CityCat4

Break the phone.
BlackBerry at one time positioned itself as the most secure phone. Remind me how the story "BlackBerry vs India" ended? There is no absolute protection. There have already been reports of telegram and whatsapp and viber being hacked. Of course, at the household level, all this is not available - but you did not build a model of the intruder.

T
TyzhSysAdmin, 2017-04-14
@POS_troi

Raise your Jabber server, set up SSL + PGP and communicate only by text.
Even if somehow PGP is broken, then the proof that you wrote it is only indirect, but the existing voice is already a more concrete proof.
In general, if you are discussing something "such", then there can be no talk of any voice.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question