site banner

Israel-Gaza Megathread #1

This is a megathread for any posts on the conflict between (so far, and so far as I know) Hamas and the Israeli government, as well as related geopolitics. Culture War thread rules apply.

20
Jump in the discussion.

No email address required.

Random rumors from the internet:

https://twitter.com/realpepeescobar/status/1711973752924455254

Mossad is now blaming Huawei.

Hamas used Huawei smartphones with no Western backdoor.

That completes switching the blame to the new "axis of evil".

Russia-China-Iran.

The source is a twitter account named @RealPepeEscobar, so do your due diligence, but if this is true it's absolutely hilarious: Western intelligence agencies spend their time and money breaking into their own side's hardware rather than that of the enemy...

One of the replies to the tweet says he'll go and buy a Huawei now, and to be honest who can blame him, just like how having western rather than Chinese backdoors in your hardware protects you if you're living in China, having Chinese rather than western backdoors protects you if you're living in the west.

It seems very unlikely. The release of various Pegasus/NSO Group stuff shows that they very much weren’t exploiting deliberate back doors (which would have made things much easier) but obscure vulnerabilities in iMessage etc. I find it hard to believe that Huawei phones running on Android or their own weird HarmonyOS (which is cobbled together out of a lot of different things, including a fork of Android 10, and which is pretty new anyway) are more impenetrable than latest model iPhones. All the extensive evidence points to the reverse being true.

They are not. But usually in this world all interesting targets use iphone. And because android could be rooted it could be made more secure.

Random nitpick. It may make sense to root a device to strip away tracking or privacy impacting features. Though some way argue that your attempt to do so itself may be fingerprintable.

For security... doubt it'd do much. If your device maker is releasing poorly secured software why would the hardware/firmware be any better.

Though some way argue that your attempt to do so itself may be fingerprintable.

This is always the rub.

There is a world of difference between evading detection and evading attention, and depending on the circumstances attempts to evade one will often draw the other. As is often the case, there is a relevant XKCD

iptables. Those things usually require multi stage install. You highjack something then make request for the exploits, then download the big one. If you only allow minimal processes to have internet connection you may foil the installation itself. Also andoid doesn't have such idiocy as imessage.

Sorry, are you saying you set up iptables rules on your android phone to lock it down in case of malware/spyware/hacking?

Kinda. I just implement very strict firewall. And I suppose that unless the malware is modifying by default - and there is limitation how much logic can you implement in shellcode