▲ | Ask HN: Can I use grapheneos or flx1 Linux phone to prevent cell tower hacking? | |
1 points by xrd 8 hours ago | 1 comments | ||
Lots of interesting discussions about cell phone networks lately. Cache of devices capable of crashing cell network is found in NYC https://news.ycombinator.com/item?id=45345514 Fake cell phone towers ICE is using to track people https://www.forbes.com/sites/the-wiretap/2025/09/09/how-ice-... And, at the same time, interesting conversations about linux phones, like GrapheneOS (de-googled android) and FLX1s (pure Linux phone): https://news.ycombinator.com/item?id=45312326 My question is: are any of these alternatives helpful against these kinds of novel attacks? If you are on a phone using a network vanilla provider like tmobile or otherwise, is there any way to prevent your phone from trying to connect to a fake network? If I controlled the entire cell phone stack, like I would with FLX1s, then could I have something like the ssh initial connection signature:
Once I accept that sshd endpoint, I know my ssh client will protect me if the sshd changes and I'm experiencing a MITM.Could we do the same thing with a cell tower and not jump to it unless it was approved manually and a signature of that tower was stored for future connections? It would be a bit of a pain to accept a new cell tower when I'm in a new city, but I could imagine syncing a whitelisted trusted set of cell phone towers (ha, when I think of that the whole idea of "trusted" is laughable). But, at least I would have more insight into when I am getting surveilled. And, I could say "not today ICE!" or "tmobile, idk, please give me my HN fix, I don't even care if you know I'm aware my government is tracking me as I pay the service fee!" I bet a whitelist hosted on github would be faster to update than tmobile installing new cell phone towers so privacy enthusiasts could enable their own safety. | ||
▲ | 8 hours ago | parent [-] | |
[deleted] |