How All Phones Can Be Hacked

Поделиться
HTML-код
  • Опубликовано: 20 янв 2025
  • НаукаНаука

Комментарии • 237

  • @johnbergamini3567
    @johnbergamini3567 2 года назад +30

    I gave up using any cell phone several years ago after various hacking and abuse problems from opponents who were suspiciously good at their game. This video confirms the wisdom of that choice.

    • @louistournas120
      @louistournas120 2 года назад +8

      I have never had a cellbone. There are situations where it is useful but mostly, I do not need it.

    • @gregoryg.campbell3874
      @gregoryg.campbell3874 2 года назад +2

      Not having a cell phone it's just not an option these days. Unless you want to live in a cave and never interact with other human beings or conduct any type of transactions. It's like working for cash those days are coming to an end.

    • @louistournas120
      @louistournas120 2 года назад +5

      @@gregoryg.campbell3874 Cellbones are for people who have lives.
      I don't have a life. I am dead. I have a few PCs. I am addicted to high power GPUs.
      Cellbone GPUs are weak.

    • @russellm7530
      @russellm7530 2 года назад +3

      @@louistournas120 What the hell are cellbones?

    • @louistournas120
      @louistournas120 2 года назад +2

      @@russellm7530 It's very popular.

  • @drummerboyj70
    @drummerboyj70 2 года назад +3

    Awesome video Rob, breaking down smartphones into their component parts. For anyone wanting to know how a smartphone works, this is a must watch video!

  • @robr4662
    @robr4662 2 года назад +35

    Love your videos. Would you be able to do a security analysis of a "dumbphone"? I have been avoiding smartphones since the beginning and want to know what vulnerabilities exist in a modern "dumbphone" such as the nokia(hmd) 110 4g. I believe it runs a threadx operating system. Thank you for all you do!

    • @readypetequalmers7360
      @readypetequalmers7360 2 года назад +8

      I think that would depend on a lot of factors. Some dumbphones run Android to my understanding and would be the same as Android devices except that you wouldn't use a dumbphone as much as an Android. Android/iphones are designed to be a personal computing device, but dumbphones don't have that enticement. If a dumb phone isn't android it could be proprietary just like the mentioned "MP" device. Each company building their own OS with their own security flaws and probably not updated frequently. If it's proprietary code no matter the type of devices you run into the same security problems of not knowing what it does and possibly not being updated when flaws are found etc.

    • @robbraxmantech
      @robbraxmantech  2 года назад +24

      All phones including Dumphones have an MP and that is the target. All phones can be hacked.

    • @ktheodor3968
      @ktheodor3968 2 года назад +9

      @@robbraxmantech Has not Richard Stallman been a staunch critic and long-time dismisser of mobile telephony? Personally far from an uncritical "fan" of Stallman's, but in the light of many of your excellent content videos, I can now see exactly where Stallman is coming from over his rejection of mobile telephony -- of course, never mind smart telephony. I should add, if not mistaken Stallman is also against the payment for any goods on credit or debit cards or any other "convenient" means of payment than cash money. I suppose, after a point it does come down to one's personal, and indeed *philosophical*, choices about how much information technology, technology altogether, wants to adopt. I am not against technology, IT or favouring any romantic return to the caves for privacy and freedom. There are no easy answers to these things, but UTube channels like yours are excellent in bringing to the surface (literally) the mechanics of it all and for people to make informed choices or at least be aware rather than be clueless and passive. I really hope you carry on with such content videos. (I particularly welcome when you yourself say words to the effect of "..I don't know...", "..I am at a loss myself about that..", "..I suspect...", etc.)

    • @robbraxmantech
      @robbraxmantech  2 года назад +29

      Thank you @K Theodor. I don't necessarily subscribe to everything RMS believes since his objectives are different than mine. But we need a voice like his to at least open the discussion of alternatives. My philosophy is simple. I just want us to be left alone. Not under the control of some maniac in private corporations or government

    • @sashas3362
      @sashas3362 2 года назад +2

      @@readypetequalmers7360 The variation in the android devices due to differences in the proprietary OS's created from android have been said to actually enhance android security against hackers because then the hacker has a harder time knowing what OS they are or will be attacking. Of course the unpatched security holes you mention can be exploited by those who have a more privilieged access to your device such as the manufacturer, mobile phone service carrier/provider, and of course the gov (among others).

  • @ryangrand1316
    @ryangrand1316 2 года назад +4

    Hey Rob, just wanting to thank you for your videos, very educational !

  • @bonkbonk92
    @bonkbonk92 2 года назад +4

    Like you mentioned, I'm excited about what will happen with the Pinephone. I recall reading that the modem was open source and one of the developers was able to run Doom with it on some level. Sounds like that kind of control would be great to have.

  • @kenhnsy
    @kenhnsy 2 года назад

    For some reason, Rob, adding those page breaks is really helpful. Thanks for a great video.

  • @ecwnikos
    @ecwnikos 2 года назад +2

    wow you opened my eyes to this info thank you mr brax

  • @THeMin1000
    @THeMin1000 2 года назад +12

    Even crazier, the Sim is a full self contained SOC with its own CPU and memory, it runs on a limited JVM.
    Stackoverflow goes over this in more detail.

    • @robbraxmantech
      @robbraxmantech  2 года назад +7

      The SIM is not an SOC. But it has a logic chip like an RFID and it's powered by the MP SOC.

    • @sashas3362
      @sashas3362 2 года назад

      I also recall reading that a SIM is a SoC somewhere like wikipedia. You can't believe everything you read online though, especially wikipedia. I also thought I once read a GPS system is now embedded into SIM's. I can't find that info anywhere now.

    • @robbraxmantech
      @robbraxmantech  2 года назад +8

      It's getting very complicated so I tried to give industry terminology in this video so everyone can research on their own. Without the right terminology, you will not find anything. If you have the right terminology the world opens up to information

    • @sashas3362
      @sashas3362 2 года назад +1

      @@robbraxmantech Yes, one must always do their own research because the facts can vary from device to device and also part to part. Even if it seems to be the same it may have differences. There may be differences between the "generations" (such as "errata" or "erratum" lists published for each batch or generation of CPU!).

    • @mullergyula4174
      @mullergyula4174 2 года назад +2

      @@sashas3362 I don't think integrating GPS module into the SIM is possible, it would need antennas at least. But GPS like software features are possible using the cell towers.

  • @user-ut9ln4vd5m
    @user-ut9ln4vd5m 2 года назад +3

    Always nice to see a new vid from Rob, unfortunately all too often I'm left saying _"My phone could try to kill me again, and the air is turning dangerous... next year rainbows could become lethal... ahhhh, the future."_

  • @jamescampbell-gray3203
    @jamescampbell-gray3203 2 года назад +33

    As a person who has been personally targeted by said state-level threat-actors, aka Advanced Persistent Threats, I can confirm the claims made in this video.
    I am a very security conscious person, but I haven't stayed updated on security since 2012 or so, due to difficulties in my life.
    Somehow I stumbled into an illegal crypto-mining operation while living in an old dorm house on 1338 college drive, Saskatoon SK, directly across from the University of Saskatoon main Campus. I discovered a hidden mesh of WIfI networks linked to the wifi of the dorm house. When I found out my devices were being enslaved like the rest of the devices in proximity, I fought back. Upon shutting down the wifi network in the dorm house, I found nearly 15 other SSIDs also when down, suggesting dependence on a main wifi host. When I restarted the network, slowly the 15 others popped back up. It was literally a shady hacker house, and they were big players. My life was threatened numerous times. I averted being shot on several occasions.
    And ever since I escaped that situation, I have had an APT using these very technologies to create extreme stress and chaos in my digital and physical life
    Just recently I had a laptop nearly completely disabled, for the second time since this incident. They are one of many interconnected groups. There is no such things as the good guys and the bad guys at this point. The three and four letter groups have all infiltrated and obfuscated all other groups to the point that very soon, they will destroy one another from within. That is the real war being fought out of sight. And bystanders of all levels of guilt or innocence, are caught in the crossfire. If you want to own IOT devices in this day and age, just know that you are unwittingly participating in the war in some form or another, and you can very quickly become a target for any reason. Sure, it's convenient. It's fun. It's even enlightening to a degree, to own and utilize modern tech. But it is also a curse and a burden. One that will very soon be done away with in the war of Armageddon (Jehovah God's war against wickedness, and those who willingly and knowingly practice it)
    I may feel stress in my body, but I will not be broken or succumb to fear any longer. No should you.
    Mr Brax is not touting fear. He is sharing knowledge. You would be wise to listen to the things being shared. But also moreso to listen to the knowledge within the Bible. The true knowledge of Jehovah God, the one who developed the very code we are written in, the language of reality, from which all other languages, and functions thereof are derived.
    Good day

    • @Nihilist_Porcupine
      @Nihilist_Porcupine 2 года назад +5

      Is this the most elaborate copy pasta I've ever read or am I actually drunk right now...?

    • @MadCowMusic
      @MadCowMusic 2 года назад +8

      Bruh, I'm with you and I get what you're saying but honestly at the same time you should look into getting some talk therapy because these kinds of events can be really traumatic to the point where you could be left with mental health issues; ptsd, growing paranoia, and stress triggering a psychotic break from reality. Eventually these symptoms could get so bad that you end up trying to take the law into your own hands and getting arrested.

    • @denastewart-gore800
      @denastewart-gore800 2 года назад

      Good point. Thanks for the heads up.

    • @gregoryg.campbell3874
      @gregoryg.campbell3874 2 года назад

      James call mom she's worried about you😂 We missed you at Christmas all is forgiven

    • @gabor6259
      @gabor6259 2 года назад

      It started out so well. Then you mentioned the Bible.

  • @MadCowMusic
    @MadCowMusic 2 года назад +7

    Pimp My Phone: "Yo dog, we heard you like devices that spy on you so we put a spy device inside your spy device so it can spy on you while your device is getting spied on."

  • @SopotKrzyn
    @SopotKrzyn 2 года назад +2

    ALWAYS, ALWAYS great information ! Thank You, Sir !

  • @Equareo
    @Equareo 2 года назад +5

    Hi Rob. Have you checked out Biktorgj's open source firmware for the pinephone modem? Quote from github:
    0 binary blobs in the userspace. Only closed source running on the modem are TZ Kernel and ADSP firmware

    • @robbraxmantech
      @robbraxmantech  2 года назад +8

      Pinephone modem is an IOT device. The main SOC for the modem is always proprietary. All you can do is wrap it around some IOT code but you cannot stop what's in the actual MP SOC and that's where the action is.

    • @thebackbuddy748
      @thebackbuddy748 2 года назад +2

      @@robbraxmantech Thank you so much for this very pertinent information. I recently received my pinephone and was very excited because I could turn off wifi, bluetooth, modem...Unfortunately, despite all dipswitches in off position, my hackers were in the phone blocking access and blinking screens at me while they dinged notification bells in affirmation to statements I made as discovering this misery. I believe that NFMI is being used by someone nearby and every phone with IOT or some circular antenna is vulnerable IMHO.

    • @robbraxmantech
      @robbraxmantech  2 года назад +3

      I don't think a Pinephone even has NFC. And The baseband is isolated so it can affect your clls and texts but shouldn't affect the Linux OS directly. the only connection is via USB

    • @ThirtytwoJ
      @ThirtytwoJ 2 года назад +1

      @@robbraxmantech no nfc specifically last i checked

  • @SpaceGaucho_
    @SpaceGaucho_ 2 года назад +11

    the other thing you didn't mention rob is that most phones have non-removable batteries. it's just the cherry on top.

    • @full_bearfull_bear4783
      @full_bearfull_bear4783 2 года назад

      Ofc you can remove them. But sheeps wont be able to. Why they say it cant be done.

    • @ThirtytwoJ
      @ThirtytwoJ 2 года назад

      And backup micro batteries

  • @Julio05
    @Julio05 2 года назад +1

    I'd like to have the written transcription of your videos on your website. It would be much easier to take notes of any piece of information.

  • @BobISuppose
    @BobISuppose 2 года назад

    20:42 even though you turn off find my iPhone in settings when powered off?

  • @MissFoxification
    @MissFoxification 2 года назад +7

    The attack surface on phones is huge, there's so many ways someone can get data into your device. People can even exploit your phone via NFC, think about that next time you tap to pay.
    SDR is cheap, easy and portable.. I can see phones being exploited and infected en masse. There's bad actors out there that would push a blank update to your baseband modem to kill it just for their amusement.
    Being in the wrong place at the wrong time could exploit your device and if it's alphabet agency you won't even know it.
    Here's some food for thought.. what about all the other IOT devices with modems, what about vehicles? It's likely they are much more vulnerable than your phone is. We're definitely going to be hearing about this for years to come.

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      My point in exposing this is that some parties claim they know everything about their OS and guarantee its security and claiming others are not as secure. And the truth is that they only understand the AP.. But you already know this

    • @MissFoxification
      @MissFoxification 2 года назад

      @@robbraxmantech It's a good point. We're all vulnerable. All we can do is our best and hope it's enough. I run GrapheneOS, the baseband is isolated but I can't say whether it's enough or not, I suspect if I was a target it wouldn't be.
      They could probably load the code in memory and use a silent sms to execute it.
      Don't let people get to you, some people will never listen or learn.

    • @ProudlyINDIAN360
      @ProudlyINDIAN360 2 года назад

      @@robbraxmantech i thought ios is safe and using proton vpn and email will protect me.
      What about Android phones shall we install Kali or ubantu in it? Will all apps run? How to safe guard iPhone esp the one who won't get update after 12.5.

    • @ProudlyINDIAN360
      @ProudlyINDIAN360 2 года назад

      @@MissFoxification i thought ios is safe and using proton vpn and email will protect me.
      What about Android phones shall we install Kali or ubantu in it? Will all apps run? How to safe guard iPhone esp the one who won't get update after 12.5.

    • @ProudlyINDIAN360
      @ProudlyINDIAN360 2 года назад

      @@MissFoxification grapheneos on you laptop or phone

  • @daklakdigital3691
    @daklakdigital3691 2 года назад

    A QUESTION.
    My company invested a lot of money in ruggedised cell phones, and with 3G being closed down we decided to buy a few 4G & 5G to WiFi modems so our 3G handsets lifespan is extended. The SIM cards have been removed from the 3G cellphones.
    So we have sub-nets of cellphones running on modems - we use Telegram, and similar, for comms.
    The questions centre around the modem & cell network. Given the only SIMS are in shared modems, what useful data could be collected upstream.
    One other question. There is a setting on Android for WiFi comms between handsets. How do these networks operate?

  • @nickoshana2246
    @nickoshana2246 2 года назад +8

    This is both educational and depressing.

  • @Hfil66
    @Hfil66 2 года назад

    I don't see multiple OSes as a problem, quite the converse. While the risk of a bug in an OS is higher (in fact, one might even suggest it is a certainty), the scope to use that bug is smaller since you can only use that vulnerability on a relatively smaller number of phones, so the cost/benefit is higher because you have to pay the same cost to find a vulnerability for a smaller number of phones.

  • @kyliemole4549
    @kyliemole4549 2 года назад +1

    In Australia here where the gov and it's agencies are completely evil and unchecked when it comes to thier unchecked privacy endeavors to normal everyday citizens.. hacked monthly.. pinged constantly ... lov your work Rob...

  • @carly09et
    @carly09et 2 года назад +1

    Phones have five computers - the key three are com, interface & power management.
    The Com part has to interface with the telephony system - it is externally defined.

    • @robbraxmantech
      @robbraxmantech  2 года назад

      I believe you. Do you have inside information? I always say there are at least 3

    • @carly09et
      @carly09et 2 года назад +1

      @@robbraxmantech It comes from the specifcations - the Telephone part is "fixed" . The power control is very cryptic - I know it exists - i don't know much about it, it is very much the security hole in Apple devices :(.
      The telephone part is public, So is insecure by structure. The security comes from economics - the cost of network access - little security for the user here.
      The interface is much too complex for the function provided, so lots of security holes.
      The Fourth Computer is the hardware Abstraction, it networks everything
      The Firth Computer is the data management engine.
      I define computers from a mathamatical prespective.
      You are defining computers from a hardware network prespective. you are correct in that three is a minimum.

  • @mjmeans
    @mjmeans 2 года назад +2

    How can anyone be 100.000000% certain that there isn't a hidden internal eSim, or engineered flaw/feature providing equivalent connectivity, built-in to the MP? I wish there were a true open-source solution.

    • @robbraxmantech
      @robbraxmantech  2 года назад

      If they did that, they would be circumventing their own security which is the "Ki" on the sim card. Someone can harvest "Ki"s and can duplicate Sim cards. So it is possible but if would be a stupid move from a cybersecurity point of view. Remember the actual identifier to enter the carrier network is the "Ki"

  • @Chris-ut6eq
    @Chris-ut6eq 2 года назад +2

    Sorry if I missed this. What is the attack surface of a simple 'dumb' phone with no dataplan? You know, a phone that a phone and only a phone. And not a pocket computer which makes calls, runs hackable apps, does not protect privacy at all well on many levels.
    Last point, phone with removable battery and faraday bagging options.
    Without going all tinfoil hat, is it possible to have a cell phone yet be private/hidden until it's turned on for use as only a phone for calls/sms? Would like to see a video of this discussion.

    • @robbraxmantech
      @robbraxmantech  2 года назад +3

      The video applies. It has an MP like all phones. Hackable like all phones. But because there is no AP then the hacks would not access internet activity and files

    • @Chris-ut6eq
      @Chris-ut6eq 2 года назад

      @@robbraxmantech Thanks! Was hoping for some dirt cheap MP less capable/hackable.
      MP attack vector is always carrier network based? loosing AP reduce vector at all?
      You channel is always insightful and thought provoking, thank you!

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      As I understand it, MP communications is through the radio only. So that can be initiated by a cell tower or something emulating a cell tower

    • @Chris-ut6eq
      @Chris-ut6eq 2 года назад

      @@robbraxmantech That last part "...something emulating a cell tower" is both worrying, and provoking.
      While it would take a good bit of engineering, emulating your own cell tower as man in the middle then monitoring, filtering and potentially firewalling could be quite interesting.....and most likely quite hard to do. But I can't see another way to even start to protect MP from nefarious actors.
      I assume cell boosters are bent pipe forwarders, but have potential to be an interesting place to start looking into. Could a phone always be forced though one connection point? Just musing out loud over a beer.
      Thanks again
      Goes back to the old movie, war games. With Cell phones the only way to win at privacy is just not to play. That's not a realistic option though, except for the Amish.

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      Stingray IMSI catcher is a government device that communicates with the baseband (MP) as a fake cell tower. So this is not a new concept.

  • @jalenwilliamz6658
    @jalenwilliamz6658 2 года назад

    Great videos. 👍 If my phone is hijacked by a Stingray device from adjacent area. Do they continue to monitor my phone or devices on the Stingray device or do they have to return n monitor, only available, from close proximity?

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      direct interception has to be in close proximity. But once your IMSI is identified, the tracking of certain things can continue using the CALEA surveillance equipment built into the PSTN (Public Switched Telephone Network)

  • @romaincr3175
    @romaincr3175 2 года назад

    What kind of sailboat do you use ?

  • @lachlanbird9688
    @lachlanbird9688 2 года назад

    Thank you for reporting .

  • @AC-um2mk
    @AC-um2mk 2 года назад +1

    Can you recommend a freedom phone buyable from the UK please? I'm due to replace my OnePlus 8T soon so looking for at least as good performance.

  • @arandomfox999
    @arandomfox999 2 года назад +1

    Wouldn't it be better to put the power switch to the whole of the MP instead? Isn't that what Pinephone does?

    • @robbraxmantech
      @robbraxmantech  2 года назад

      I actually answered that in the video

    • @robbraxmantech
      @robbraxmantech  2 года назад

      And no, that is NOT what the pinephone does. The pinephone separated the modem by using a separate SOC in an IOT USB device. Then all they had to do was unplug the USB.

    • @arandomfox999
      @arandomfox999 2 года назад

      @@robbraxmantech thanks for the answer!

  • @mydroid2791
    @mydroid2791 2 года назад

    Braxman, you should do a video on 2FA and how to set it up and use it, and if Google Authenticator is a privacy issue (compared to Authy or a Yubikey).

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      I have so many videos on that in a row

  • @mrshmanckles1463
    @mrshmanckles1463 2 года назад +1

    My phone has no SIM and I only use google voice for messages and occasional calls so how is my security?

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      Change from Google Voice to a VOIP provider like Viber.

  • @Eagleoneradiogod
    @Eagleoneradiogod 2 года назад

    The smd components on the pcbs are now connected by tiny nano meter sized pins underneath the chips that are adhered to the pcb connecting pads by a hot air gun or hot plate and a pre printed template that holds the component's in place Witch only the manufacture is licensed to only have these component holders while the pcbs are being manufactured. You can make one of these holders if you have a 3d printer a scanner and a programme. So you can make shure that you will make all the connections underneath the chip and components like the capacitors and diodes cause they are soo sooo tiny. And an old cell phone makes a good rework soldering iron.rhTs what I use.

  • @bcaominh
    @bcaominh 2 года назад

    Do the same threat vectors also apply to Ipads or tablets if they have cell data capabilities?

  • @Thor11th
    @Thor11th 2 года назад

    Hey Rob, where can I reach you? I need your advice

  • @denastewart-gore800
    @denastewart-gore800 2 года назад

    Thanks Rob.

  • @davidr2715
    @davidr2715 2 года назад

    So…. Pull the SIM and battery. Use it as a wifi phone (replace battery, no SIM). Right?

  • @calderetaman
    @calderetaman 2 года назад

    thanks your work is fantastic,

  • @smilo_don
    @smilo_don 2 года назад

    But even without the SIM wouldn't the phone be identifiable via the IMEI? Or is that not transmitted without a SIM present?

    • @robbraxmantech
      @robbraxmantech  2 года назад

      The transmitted value is "Ki" not the IMSI which is in the SIM. Without it, you are not accepted on the network unless it is a 911 call. But you initiate that

  • @r00t8
    @r00t8 2 года назад +2

    Finally a guy that knows what he is talking about.

  • @manonfire3642
    @manonfire3642 2 года назад +2

    If you offer virus and vpn protection, how does one go about obtaining it?

    • @gimlam5909
      @gimlam5909 2 года назад

      Not sure where you heard of virus protection, but for the VPN, "the link is in the description".

  • @gypsypath1
    @gypsypath1 2 года назад

    Would removing the SIM card from an iPhone (where one exists) stop it from behaving like an air tag when turned off?

  • @mohitdhillon1369
    @mohitdhillon1369 2 года назад

    Can someone track your identity if you use a burner app for text messaging? If you use a burner app to send messages to a normal number, can they find your real identity?

  • @DVincentW
    @DVincentW 2 года назад +1

    Figure out why my pos Android switches videos at the slightest touch but I have to hammer the keyboard to communicate.. bang bang. Arrgh.

    • @terrydaktyllus1320
      @terrydaktyllus1320 2 года назад +2

      Don't use "expensive toys" for computing and entertainment. Use proper computers with proper adult operating systems like Linux.

  • @mabeljoe4305
    @mabeljoe4305 2 года назад

    what about "eSIM"? no physical SIM cards involved and no physical swapping over required by you.

  • @ProudlyINDIAN360
    @ProudlyINDIAN360 2 года назад

    What do you think of Apple watch and iPhone

  • @tigerscott2966
    @tigerscott2966 2 года назад

    I think we are at the end of mobile phones. Its been only 15 years since the first iPhone hit the market. Now there are watches that function like a phone.

  • @chrisguli2865
    @chrisguli2865 2 года назад

    Use a faraday pouch long before reaching the "danger zone" if you don't want to be geofenced. Better yet, leave the smartphone home and take a burner phone that is not linked to you. Or, best yet, no phone at all.

  • @wayneholzer4694
    @wayneholzer4694 2 года назад

    Something people should be concerned about Windows 11's new feature being able to access your contacts, sms messages make and receive phone calls, send and recieve MMS messages from direct from Android phones to Windows 11 devices meaning between cell carriers to the servers and ISP's between this poses a serious risk IMO and I am wondering if you have already covered this if not could you please enlighten the dangers to those who think this is a cool feature of Windows 11 but to someone like us who know this is not a cool feature this is a cool feature to big tech and three and four letter agencies. Another thing here in Australia 3G still exists and is rarely used even 2G in some remote parts of Australia but I have seen my phone in the last year go from a 4G LTE connection to 3G for whatever reason and after watching this video it is concerning privacy wise. Australia has passed new data retention laws and the ability to hack into someones social media account edit and modify posts and data mine which is very scary but I thought asking you about these things as you are a expert in the fiel of phones and maybe point out to the masses the risks of connecting Android devices to Windows 11 thanks for another informative video cheers

  • @AlexMercersRevenge
    @AlexMercersRevenge 2 года назад

    Lots of vulnerabilities talked about but no solutions offered. What about using a degoogled phone with no google apps in it?

  • @21stcenturyscots
    @21stcenturyscots 2 года назад

    Please save me, Rob.

  • @johnlannigandroneworks
    @johnlannigandroneworks 2 года назад

    Boy Rob you ever have alot of commercials lol

  • @PhoebeAvro
    @PhoebeAvro 2 года назад +1

    Just don't use one for anything that's not humdrum mine is used for getting txts for 2ffa and that's about it and its de-googled and certainly not registered with the play store!

  • @outsidein3206
    @outsidein3206 2 года назад

    Thing about data collection "911 excuses" They had the data, the problem was inter agency communication, at least officially to the public.

  • @michelleauckram4020
    @michelleauckram4020 Год назад

    Hi can you protect a dumb phone ? Thank you

  • @Jenny_Digital
    @Jenny_Digital 2 года назад +1

    The SIM card runs JavaCard and is a smart device all of it's own Rob. I will post my source if I can find it.

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      It's a smart card. Not a CPU. So it still requires some interface to a CPU. It is a logic board

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      An RFID is similar

  • @JPS13Laptop
    @JPS13Laptop 2 года назад

    Only one of the chips on the circuit board is the SOC, not the whole circuit board.

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      Huh? There are at least 3 SOC's in a phone

    • @arandomfox999
      @arandomfox999 2 года назад +1

      @@robbraxmantech he's confused by the fact that THE SOC is commonly only referring to the single primary user application processor suite.

    • @JPS13Laptop
      @JPS13Laptop 2 года назад +1

      @@robbraxmantech I just noticed that at 2:34, you say that the main circuit board/motherboard inside the phone is referred to as an SOC, which was the reason for my initial comment. I know as far as iPhones are concerned, I've only heard the acronym SOC being used only in reference to the A-series chip and nothing else. That being said, I kinda understand the idea that the baseband chip could also be referred to as an SOC while thinking about it just now.

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      Then let's make it clear. An SOC is a full CPU. The two independent CPU's are the AP and the MP. The AP runs other SOC's like the Wifi/Bluetooth/GPS module. That's under the control of the AP.

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      This video is intended to make everyone rethink what is actually going on. If you watch the video fully (it is very dense), the MP has a different OS (RTOS) has it's own separate Input/Output and shares memory with the AP (plus it's own firmware storage area). This is not a single chip.

  • @QuoVadistis
    @QuoVadistis 2 года назад +1

    Not sure if your assumptions about a phone with a SIM card removed is correct. I would be surprised if SIM ID is not cached.

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      It's a reasonable assumption because of the security issue with "Ki"

    • @QuoVadistis
      @QuoVadistis 2 года назад

      @@robbraxmantech Good point. Thank you.

  • @northernpatriot9078
    @northernpatriot9078 2 года назад

    Alaska state trooper got warrant and were in my phone in less than a week even though it was on code lock eazy peazy for a lot of government agencies

  • @gregoryg.campbell3874
    @gregoryg.campbell3874 2 года назад +1

    Great were screwed😀 Time to go sailing👍

  • @Thor11th
    @Thor11th 2 года назад

    I'm facing all this...

  • @MadCowMusic
    @MadCowMusic 2 года назад +1

    It's computers all the way down!

  • @johnbruhling8018
    @johnbruhling8018 2 года назад

    I use "emergency mode" on my phone which is a power saving feature which they hide in the emergency call settings. They further disincentivize it by giving you a user agreement first that a normal person (skimming) would find unnapealing. Then, in the mode, the text feature becomes a 'send help' by initially auto-populating the text field with "I need help" and a google map link to my gps coordinates however one only needs backspace that away. You get 2 optional apps (including browser and FB yuk) but the reason I use it is because on a full charge the battery will last over 8 days NOT on airplane mode and so, I imagine, that this mode will actually not, or at least in a diminished sense, exploit your tracking data so ubiquitously. Maybe Im wrong but the phone battery actually lasts that long and the only thing I can figure is that its just not broadcasting non-stop like normal.

  • @Michael-Archonaeus
    @Michael-Archonaeus 2 года назад +11

    This is exactly why my SIM is in a dumb phone, and my smartphone only gets WiFi.
    If my phone gets hacked, all the hacker gets is my contacts, which are all first names only, with no "moms" or "uncles," and of course some text messages.
    My phone's CPU is literally too weak to handle any spyware, so I'm safe from that too.

    • @VndNvwYvvSvv
      @VndNvwYvvSvv 2 года назад +1

      No such thing as a true dumb phone anymore, but yeah, you can limit a lot of it with a basic "feature phone"

    • @Michael-Archonaeus
      @Michael-Archonaeus 2 года назад +2

      @@VndNvwYvvSvv What do you mean "no such thing?" My Nokia 6300 from 2007 isn't a "true" dumb phone?

  • @Thor11th
    @Thor11th 2 года назад

    Apple should hire you. Please write a paper in their device vulnerabilities

  • @salvatoremusic5302
    @salvatoremusic5302 Год назад

    I had to lock and get puck code

  • @levelup1279
    @levelup1279 2 года назад +1

    Hackers should find zero day vulnerabilities and back doors to get root access, then go around a broadcast to brick EVERYONES phone in major urban areas lile New York, DC, & London. Then openly publish what their doing over a tor hosted server & explain to the world how governments are using security flaws.
    Imagine some guy with an antenna in his trunk driving around a city bricking everyone's phone in a 500 meter radius with some automated script.
    That would get a lot of attention, & keep doing this until you cant find any more flaws or vulnerabilities. That would get a lot of media attention, especially if you did it in DC where a lot of rich powerful people live. They would hopefully start demanding better security. Maybe also do it in silicon valley near the HQ's of these tech giants.

    • @davidtolle9533
      @davidtolle9533 2 года назад +1

      That is a fine line to cross but I like how you think. (Disclaimer: i am not advocating for this just admiring the creativity)

    • @MadCowMusic
      @MadCowMusic 2 года назад +1

      The problem is that a zero day exploits can be sold for upwards of $2 million dollars to gov and criminal organizations. Heck some of the companies even have bounties on these zero day exploits if you want to avoid possibly getting Epsteined.

  • @ikust007
    @ikust007 2 года назад

    20:11 good One /)

  • @litecoinawarenessphoenix34
    @litecoinawarenessphoenix34 2 года назад

    We need RISC-V based smartphones.

  • @tigerscott2966
    @tigerscott2966 2 года назад

    We are really dealing with alien technology here.

  • @xapemanx
    @xapemanx 2 года назад +9

    I'm proud to have watched this on Odysee first :)

  • @hxhdfjifzirstc894
    @hxhdfjifzirstc894 2 года назад

    Rob, you're saying that adding a switch will RUIN the function of the antenna, so it won't work to turn the antenna off. THINK ABOUT IT. RUINING the antenna is JUST AS GOOD as switching it off. Right? So what you need to do is add a switch at the END of the antenna, to add length to it, so that it can't resonate at the right frequency. I'm always surprised by your consistent NO-CAN-DO approach to problem solving. JFC, buddy. Just get it done, already.

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      Hahaha! But as I said in the video, it is 12nm tech. You got a soldering gun for that? LOL

    • @hxhdfjifzirstc894
      @hxhdfjifzirstc894 2 года назад

      @@robbraxmantech I want YOU to design a daughter board that adds switches to sensors, antennas, etc. There's no need for a solder gun, or a microscope. The connections will be done simply by sandwiching in between the FPC connectors that connect the logic board to the sensors. It's all PLUG AND PLAY, especially if you design it to replace the original back of the phone.
      It's odd when a smart guy is purposely obtuse, and won't make a product that would be in high demand for his 360,000 subscribers. Once again, you say NO-CAN-DO, yada, yada, yada. But YOU are the one that said it's so easy to make an antenna non-functional by changing its length.
      Who cares whether its 12nm tech, or 20nm, or 5nm? A logic board is still a logic board, and an SMD QFP or BGA is still a QFP or BGA. An FPC connector is still an FPC connector.
      With all this no-can-do BS you throw out, I'd bet a lot of money that you had a government career.

  • @sashas3362
    @sashas3362 2 года назад

    Rob do you know if it's legal to flash custom ROMs onto a tablet in the USA yet (replacing the original ROM)? I know congress made it legal for phones years ago but not tablets. But phones are basically small tablets so maybe it is legal to install custom ROMs in tablets after all? Websites say it's illegal though last time I checked.

    • @robbraxmantech
      @robbraxmantech  2 года назад +2

      illegal? It's your device. Why would it be illegal? Or maybe we're in a new world now. We buy devices and it's not really ours. However the real problem is that there's no custom rom for new tablets.

    • @sashas3362
      @sashas3362 2 года назад

      @@robbraxmantech I agree with that statement about ownership. I asked because I did hear some recent news about the passage of some new laws which might make it legal now such as what they call "right to repair" laws (or executive orders?). No custom ROM's for tablets? Really? You sure? I could swear I recall seeing some custom ROM's for some tablets. Lineage OS at least iirc. I'll need to check to be sure. That was a while ago. Possibly a few years ago.

    • @sashas3362
      @sashas3362 2 года назад

      @@robbraxmantech My understanding is it's perfectly legal if the tablet manufacturer allows it and you truly own it. You may not truly own a device though. Especially if it's provided by some cell phone service provider. You must check the licenses for it. Some are subsidized making them more affordable but at the cost of never actually owning it so you forfeit the right to install custom roms unless it's allowed by the license.

    • @sashas3362
      @sashas3362 2 года назад

      @@robbraxmantech Looks like you're right. Lineage OS does not have any roms for the tablets I thought I remembered seeing. At least not now. None of the android custom ROMs I was thinking of have any roms for tablets. So it's back to the drawing board for me.

  • @weebhatecrew330
    @weebhatecrew330 2 года назад

    "The superior man does what is proper to the station in which he is; he does not desire to go beyond this." - Confucius 孔夫子

  • @selinapena3276
    @selinapena3276 2 года назад

    Nice

  • @Cookiekeks
    @Cookiekeks 2 года назад

    You put up fantastic videos, but I hope you consider switching the intro. To be honest, the intro looks like a random template from the internet and is not fitting at all.

    • @terrydaktyllus1320
      @terrydaktyllus1320 2 года назад +1

      Would you like him to come over to your house and fluff up the cushions in your chair for you?

    • @Cookiekeks
      @Cookiekeks 2 года назад

      @@terrydaktyllus1320 i just said I didn't like the intro, what are you talking about?

    • @terrydaktyllus1320
      @terrydaktyllus1320 2 года назад

      @@Cookiekeks I don't like your 4 videos either.

    • @Cookiekeks
      @Cookiekeks 2 года назад

      @@terrydaktyllus1320 ok? Why do you feel so offended by me not liking an intro?

    • @terrydaktyllus1320
      @terrydaktyllus1320 2 года назад

      @@Cookiekeks I am not offended. I am amused at how self-entitled you are - like many rude people on RUclips.
      You should be grateful that creators like Rob spend so much time creating content that you get for free.

  • @full_bearfull_bear4783
    @full_bearfull_bear4783 2 года назад

    Why do we even use phones? I totally forgot why I just bought a new phone.

  • @judaspreistvlct
    @judaspreistvlct 2 года назад

    Its not a risk on my landline! :)

  • @randystegemann9990
    @randystegemann9990 2 года назад

    So glad I don't have one of these.

  • @Dastardly_X
    @Dastardly_X 2 года назад +1

    🙏🏻 🌟 🙏

  • @LokiScarletWasHere
    @LokiScarletWasHere 2 года назад

    "A phone motherboard is an SOC"
    You mean a phone CPU is an SOC
    Also I've been quiet about this, but Bluetooth BLE is redundant and makes you sound like a robot. Either call it BLE or Bluetooth LE.

    • @robbraxmantech
      @robbraxmantech  2 года назад

      have you looked at a phone motherboard lately? which CPU? There are at least 3.

    • @LokiScarletWasHere
      @LokiScarletWasHere 2 года назад

      @@robbraxmantech That's the thing. A motherboard is not a chip.
      A motherboard is a printed circuit board. An SOC is a system on an *integrated circuit* , or "chip"
      There are 3+ SoCs on the average phone motherboard.

    • @LokiScarletWasHere
      @LokiScarletWasHere 2 года назад

      Just realized I might not have elaborated enough. A computer with all the required components on one PCB is what you could call a Single-Board Computer, or SBC. SBCs usually have one or more SOCs on them, serving as processors, radio controllers, etc. Phones are just the spookiest of their kind, with multiple independent SOCs rather than codependent ones you might find on things like the Raspberry Pi.

  • @SamsungGalaxyEdge
    @SamsungGalaxyEdge 2 месяца назад

    Respect

  • @robi8020
    @robi8020 2 года назад +2

    “Geofencing” does not mean finding people, it means limiting access based on a location

  • @natewhite455
    @natewhite455 2 года назад +1

    Samsung, Criket phones have a Bad Problems with Hackers, mass up Texting real bad....

  • @paultraynorbsc627
    @paultraynorbsc627 2 года назад +1

    US robotics modems 👍👍

    • @robbraxmantech
      @robbraxmantech  2 года назад +1

      those were the fast ones! 9600 baud! But the original Hayes modems. 300 baud. 1200 baud.

    • @paultraynorbsc627
      @paultraynorbsc627 2 года назад

      Indeed Rob i have still the original one 👍

  • @ilegalanimacion
    @ilegalanimacion 2 года назад

    How to find if my cell is hacked.

  • @SereneSoakingSounds
    @SereneSoakingSounds 2 года назад

    Me watching from a huewei phone 😂📱👀

  • @Wakeup382
    @Wakeup382 2 года назад

    I need a professional in SoCal and will pay anyone who can get my nighthawk up and running. Plus never let the upstairs neighbor never crack my passwords. Rob! I need support by you or one of your people. I just need one on site to get me up and running as my walls are thin and they know and cause a DOS. Yes I’ve seen analytics in my iPhone. Rob, I’m not Ev en sure where to start.

  • @riggy7328
    @riggy7328 2 года назад

    I been braxed

  • @tigerscott2966
    @tigerscott2966 2 года назад

    People continue to fall for fads and glamorous designs over security and privacy.

  • @godlysoul7543
    @godlysoul7543 2 года назад +1

    You bring me light! In my dark world,love your videos,don't waste your time on the bad apples opionions. You waste precious time on the misery others love to create ,they obviously need company!? I appreciate everything you do,your honesty is so appreciated, Tell Snowden I'm working on a Global decision for his release! Cops do bad they go unpunished? God 🙏 always wins! AMEN!

  • @mastersili
    @mastersili 2 года назад

    This is 2022 build a decent website.

    • @cybair9341
      @cybair9341 2 года назад

      I don't give a damn about aesthetics. Content is king.

  • @vprince9907
    @vprince9907 2 года назад

    Reverse engineering huh hmm .....

  • @cristianserranocano2870
    @cristianserranocano2870 2 года назад

    No tengo ordenador no tengo para pagar nada no llega los pensión afin de mes tengo tres boca para ha limentar mi perrillos gue también gastan comen.

  • @curtiswalter86
    @curtiswalter86 2 года назад

    I'm f they know your phone number they can spy with your camera on your own phone(? T or F

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    No me vejiles tanto kita las cámaras de mi casa gue no kiero gue me ponga cámaras llo note pongo nada no teconoco de nada no teconoco nunca

  • @totrovilado5464
    @totrovilado5464 Месяц назад

    SS7

  • @BerndFelsche
    @BerndFelsche 2 года назад

    IMEI is still available without the SIM.
    With sufficient monitoring, a temporarily removed SIM can be associated with an IMEI.

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    No tengo ordenador no kiero tenerlo paso de todo estoy esperando gue lleguen los dinero no hay nada todo mentira mentira Hi metira

  • @eternalwarrior7060
    @eternalwarrior7060 2 года назад

    🎖🎖🎖🎖🎖🎖🎖

  • @chrisbarby1137
    @chrisbarby1137 2 года назад

    P