Hacker News new | past | comments | ask | show | jobs | submit login

Monthly (daily?) reminder that you should use an app that encrypt your messages.



There are also apps that can tell you when you are connected to a new unknown tower.


Can you post some names and links? I'd like to check them out.



There aren't any that don't require rooted phones or specific hardware. So not at all practical.


Any for iOS?


No, iOS has no way to expose the cellid information to the apps on phone. Well at least for non-jailbroken.

Best you can do is

\3001#12345#\

and memorize your regular cell information for areas you frequent.

(NFC how to get asterisks to show on here, help is useless put them in where the backslashes are)


  *3001#12345#*
(indent two spaces to disable formatting)


That didn't work on my iphone on att. :(


It'll work, I just have no idea how to escape special characters here, see my parent.


Works on my phone. Reminds me of phreaking. What other secret codes are there like this? How did you come to learn about this one?


It's called USSD, there's a short list on Wikipedia. A lot of them are carrier dependant, and some carrier models of certain handsets will block some codes.

https://en.wikipedia.org/wiki/Unstructured_Supplementary_Ser...


Not the OP, but I remember these codes from my first phone, a Nokia 5110.

In addition to the already mentioned code of [STAR]3001#12345# there is also [STAR]#06# which will show your IMEI.

There were plenty of others (including spelling out 'WARRANTY' to get the manufacture date of the phone) but I forgot most of them.

Interestingly, on the iPhone, dialling anything of the format [STAR]# ...anything... # will cause the screen to go grey as if a separate app, then after a short delay tell you that your code was invalid.


oh this is sweet!

For anyone who is confused:

Star #3001#12345# Start

I love how it opens up a separate app. Good stuff


That first # is extraneous. It's

    *3001#12345#*


Sorry, none of us could figure out how to escape the asterisks, how'd you do it? Feel like I'm trying to triforce here.


GP used indenting (which wraps text in (the equivalent of a) <pre>-tag -- intended for code listings and such:

  I'm an asterix * and I'm ok
  [ed: ***proof-no-space*required**]
However, a single asterix * with spaces on both sides is also "escaped": I * blink * all day and sleep all night?

So: " * #999# * " should work.


*asterisk


Yeah, formatting on HN is a bit of a dark art. This explains it: https://news.ycombinator.com/formatdoc


This one works, thanks.


Doesn't seem to work on Verizon.


Worked on my version of Verizon. Wow is that ever cool.


The extra '#' made it not work, I think. Yeah, neat!


This is good advice, but I'd like to point out that you could avoid the surveillance revealed in this project by simply using anything other than default SMS.


Would be interesting to deploy an app that can send encrypted/signed SMS. It would likely spike your messaging bill thought, as fitting all that in 140 would be hard, resulting in multiple SMSs going out pr message sent.


It was done before. See Signal's predecessor, Textsecure (before they added Signal protocol, pre-2.7.0).

If I recall it limited encrypted messages to 60 characters before splitting. It was also annoying in that you needed to initiate an OTR handshake to start messaging.


That handshake, or the initial exchange of public keys, is the one thing that seems to stymie general adoption of encryption for personal communication.


Current Signal fortunately doesn't make this apparent to the end user, it's install and go message whomever advertises support.

I'm ditching Pidgin-OTR today actually because of the OTR usability issues needing to handshake on every laptop restart. Will be going over to bitlbee terminating OTR on a server and then accessing my ZNC supporting push through TLS. Much less jarring.

OMEMO would be better than OTR for this, but not much supports it yet.


If only there was some robust, open, mature protocol supported by every device on the planet that supported encrypted sessions using an open, mature form of encryption.


Use Tor. Use Signal.


That won't protect your location and identity from constantly being leaked.


Don't use a phone then. Identifying information is being collected and stored by the carrier for at least a month, which can then be handed to regular law enforcement upon subpoena. Federal level likely doesn't even need due process.

Moxie himself spoke about this in the past.


I'm not talking about carriers identifying you, I'm talking about people intercepting your IMEI and phone number and being able to uniquely identify you wherever you go. People have been drone strike'd based on the location of their phones.

Carriers being awful is a separate problem. My annoyance rests with the 2G protocol being awful.


At least in the past anyone with SS7 access could already do that based on either of those identifiers.

Phones, especially smartphones, are pocket spies. If you need privacy, don't take them with you!*

There is no such thing as a privacy smartphone.

* Honestly if you want a private conversation don't have any kind of phone or laptop in the same room.


I get that, and carriers are definitely stupid. But preventing people from gaining SS7 access is much easier than fixing a broken protocol in use by many devices. Blocking SS7 access is something carriers can do. Fixing 2G is just not possible, and anyone can break it, right at this very moment, with a tiny bit of hardware.


> People have been drone strike'd based on the location of their phones.

Do you have any credible source for this claim. If true, it's truly alarming!



Thanks. From the Vice Report...

> Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

You are right. This is very disturbing. I guess they do this a lot in Northern Pakistan / Waziristan area in the tribal lands and mountains? What if the Terrorist read stories like this, and gave their cell phone to mules who then get killed?

My father's family (he grew up in India in Bombay) got split in half during the Partition of India and Pakistan when the Brits left India. No wonder there is so much rage and anti-american sentiment in Pakistan (my Pakistani relatives complaint all the time on Skype)


Would you count WhatsApp amongst that list of apps?


I believe that WhatsApp would protect against this attack in particular, so it's at least an upgrade over the status quo.

But you really want something like like Signal.


Before they were bought by Facebook, maybe.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: