Can brax3 be tapped and what way is it possible?

It is obvious that every device beeing manufactured by technology is now connected to some sort of control center that collect and sells data. Phones are connected to towers and they share data to someone. The thing is that we want to be hidden as person behind that device. It’s possible that other devices will use brax3 as a sharer of data that other devices collect. Share your toughts we want to know more to learn more…

2 Likes

I live in the USA where the word Privacy means the opposite. There is Nothing you can do to find it, even if you try hiding under a rock. If you are not a major political campaign contributor ( any party) no one listens to you, so no laws are enforced. If you have cash you can buy anything. There are no secrets except secrets by Big Tech. The big G, was just ordered to pay 500 million dollars for continuing to fail to follow Privacy laws and they admitted it. But No one goes to prison, they just raise taxes and prices and keep talking.

2 Likes

I need to watch the movie Idiocracy and see if it is better than what I am experiencing. We already had president Camacho and it is getting worse.

1 Like

Reclaimthenet.org does a great job exposing vulnerabilities. It used to be that a warrant was needed to spy internally, but now it’s almost completely eroded. Local police have access to cell tower emulator tech. ICE has recently been handed Three-Letter Agency tech that can get into ANY phone.

Here’s a good article too: Quiet Skies

3 Likes

Spying on US citizens is what the Deep State does best! All it takes is a little money via political campaign contributions and the world is yours. No political party is clean. It is only about who WINS.

1 Like

Let’s not talk about the subject of Deep State please. Let’s stick to security services.
There are legitimate and illegitimate reasons to do it.
State-actors are to differentiate from GAFAM. The last ones being the real problem.
State-actors you can always start a revolution, you are specialize at that in the US. Big Corporations, not so much, you have quite a bad track record at that.

For a bit more understanding and history and so to extrapolate of what is possible or not, first educate, then debate.

3 Likes

Oh Yes sir! My security services seem to work? I also have an armed private patrol company that keeps my area safe. I am not concerned about any deep state since I can’t do anything about them. I just try to acknowledge they are everywhere. I had a colleague near Seattle who developed “exotic” software for “the government”. He paid big bucks so that well known “anti malware” companies would Not detect his exotic software ( known libraries or by its activities). The best defense is to avoid the threats and not play their game.

I’ll make sure to tell my friends in Redmond, San Antonio, Maryland and Alice Springs to read this article.

To answer this, it’s best to take a step back and look at things from a high-level view, especially if you don’t know all the technical details. (I’m speaking for myself) Now, I may get some details wrong, but that’s why I am focusing more at a bird’s eye view.

So, I view the Brax3 (or any other phone) as a castle, with valuable stuff coming in and out. To defend it, you need to consider multiple points of attack. i.e., It’s not one point of weakness! Just like a castle has various walls and gates, a phone can be attacked multiple ways. It’d help to break things down into components:

  • Hardware
  • Software

Hardware Vulnerabilities

A phone’s hardware is like the castle walls – it’s the physical foundation that can be breached.

  • Hardware Compromise at Manufacturing: A phone’s hardware can be compromised from the point of creation, and with multiple hardware components, the potential for vulnerabilities increases. For example, I thought I heard some mobile chips are suspected to contain unopened backdoors that are used by all phones. If these compromised chips are used in a phone’s assembly, it could be a significant vulnerability. This means that even before a phone is in use, it could already be compromised from day one.
  • Misusing Neutral Hardware Components: But assuming the hardware component wasn’t tampered with, its components can still be leveraged for spying and such. That earlier shared link mentioned leveraging Bluetooth hardware to spy on users. i.e., Any neutral component can be twisted for malicious use.
  • Finding and Exploiting Hardware Bugs: Even if there is nothing nefarious intended with certain hardware components, I imagine finding and exploiting bugs in hardware is prevalent. These bugs might not be intentionally inserted but could be mistakes made during the design and/or manufacturing process. People can discover these weak points and take advantage of them.
  • Physical Hardware Tampering: Another layer of vulnerability involves physical access to a phone. If a phone is left unattended, it can be tampered with. For instance, someone could swap a phone in a public place and inject new bad hardware. This could happen in a matter of minutes. I am not saying I am aware of anything like it, but I can imagine people are capable of doing so at this stage with enough motivation.

Software Vulnerabilities

If we shift to software… I view as the castle’s inner layers.

  • OS Vulnerabilities: The Brax3 phone, at least my vague understanding, uses three pieces of underlying software: Lunar OS, iodeOS (which is part of Lineage OS?), and Open Source Android OS. While these software work together, they also create multiple points of attack. What if Lunar OS, iodeOS, or Android gets injected with malicious code at any point? This could’ve happened during shipping delays or in the future when we update our phones. Even with open-source software like Android, code review is not foolproof, and some level of trust is still required. We rely on developers to verify the code, but how sure can we be that it’s not tapped from their end or there aren’t any bugs? Although I suppose bugs are a thing for all software.
  • App Vulnerabilities: Similarly, another software issue involves the apps you download. What if you get malicious apps inadvertently? It can “break” your device. User error basically. Or from another perspective, even when trying to download legitimate software, there’s a risk of man-in-the-middle or similar attacks. This can redirect the download to malicious software.

To be clear, I’m not saying we’re doomed or the likelihood is high for any of these scenarios (I suppose it depends), but I think having some kind of framework can help to answer the original question “Can brax3 be tapped and what way is it possible?”. With all that said, I think the answer is yes (but applies to any phone), but I hope it’s clearer on how this can happen, even from a high level.

Like for me, I’m not all that up to date with hardware nor is it my strong point so it’s something I need to continue to expand on.

On the flipside, if you are at least aware of the points of attack, you can try to mitigate them as far as your motivation goes.

Anyway, my two cents.

2 Likes

EPIC article may help understanding

I’m not so defeatest in thinking. There are things you can do as well as things to avoid and/or stop doing. The above short article gives a brief history of wiretapping and helps to clarify when it’s legal and not.

I think it’s important to note that even if one takes all the precautions known to man and makes calls to one who doesn’t bother, who do you think would be an initial wire tap? Yep, the ‘low-hanging-fruit” for sure.

I just got my Brax 3 hard cases. Excellent cases BTW, better quality than I expected. My security guard d opened my gates for the Brax 3 3rd party delivery person and he told me the driver could not speak one word of English. He tried to say “Thank you” to the driver but no comprende’. The driver had a long drive for that “last mile” delivery service. Excellent cases for the BRAX 3. Now I can use them outside where I will give them some tests.