One of my weirder hobbies is trying to convince people that the idea that companies are listening to you through your phone’s microphone and serving you targeted ads is a …
All traffic can be audited from a device if you have full access.
You can do that yourself if you want to spend a shitload of time lettering Wireshark and the technicalities of the IP protocol.
The arguments back and forth are absolutely weird to me. At least for my stock android: there is not enough data transfer unaccounted to allow server side analysis and the device resources are not under enough load to account for local analysis.
This just leaves a hidden chip for doing this. I don’t have the skills for a physical teardown so I trust others in their hardware analysis.
Why is this always “oh but they must do this! It must be the manufacturer!”
The claim that this happens needs at one point generated, unaccounted data leaving a device under full control of the analysts.
Stop giving arguments and give a trace stack. Bonus points id it comes with the ROM that generated it for reauditing purposes.
All traffic can be audited from a device if you have full access.
You can do that yourself if you want to spend a shitload of time lettering Wireshark and the technicalities of the IP protocol.
The arguments back and forth are absolutely weird to me. At least for my stock android: there is not enough data transfer unaccounted to allow server side analysis and the device resources are not under enough load to account for local analysis. This just leaves a hidden chip for doing this. I don’t have the skills for a physical teardown so I trust others in their hardware analysis.
Why is this always “oh but they must do this! It must be the manufacturer!”
The claim that this happens needs at one point generated, unaccounted data leaving a device under full control of the analysts.
Stop giving arguments and give a trace stack. Bonus points id it comes with the ROM that generated it for reauditing purposes.