[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [tor-talk] Firefox with Tor on Android?



I think that Ben Barber meant Android as a whole cannot be anonymised, at least in a plug-and-play fashion. His citing of backdoors potentiality was to show an example, which is only one of the many iterations of the wide problem. 

The other part is that Android is also desperately leaky. 

Having read this discussion I tried to VPN my connections to Tor, and the proof that it worked is that, in less than a minute, I received a text from Google alerting of a suspicious connections to my account, i.e., K9 mail had already tried to fetch my Gmail over Tor. 

Conclusion: in less than 1 minutes, I am deanonymised to they eyes of Google, which therefore include a handful of other random Advertising corporations, Intelligence Agencies, not only the ones partnering with Google but also the ones stealing their data, from wherever they can. 
And it's not over. The text message I received (containing my email address) tips a lot of other entities, starting from my phone company, that the connection anyone may have seen to Google from a Tor exit in the last minute has much chances to be me. And on,  and on, and on... And this is just one app. 
Because of course, I could not use Gmail and all, but the whole ecosystem of mobile apps is based on data harvesting, sniffing and selling. 

So, all in all, as much as the effort to port an, easily activated, OS-wide Tor protection to Android deserves consideration, it has not the slightest chance of truly working without a lot of thought put in your phone's OS setup, *before* you even turn on for the first time the damn phone. 

From what I know, Mike Perry's article on hardening Android is the only viable *starting* point to secure an Android platform. 

Good luck fellas! 

Le 23 mai 2015 15:18:27 CEST, Jens Lechtenboerger <tortalk@informationelle-selbstbestimmung-im-internet.de> a écrit :
>On 2015-05-20, at 09:28, benjamin barber wrote:
>
>> im not sure that using TOR on android is anonymous. Sure your
>favicons are
>> leaking your ip, however android itself is a leaky OS, that and
>backdoors
>> whatever agencies currently have.
>>
>>
>http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act#Technical_implementation
>
>I don’t see anything specific to android in that article.
>Acts like CALEA probably exist in every country.
>
>Regardless of the OS, it’s best to avoid centralized services.
>And to make sure they only get to see encrypted data.
>
>Best wishes
>Jens
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk