Why Snowden Asked Visitors in Hong Kong to Refrigerate Their Phones

Discussion in 'privacy technology' started by Osaban, Jun 26, 2013.

Thread Status:
Not open for further replies.
  1. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,616
    Location:
    Milan and Seoul
    http://thelede.blogs.nytimes.com/20...visitors-put-their-phones-in-the-fridge/?_r=0

     
    Last edited: Jun 27, 2013
  2. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  3. Taliscicero

    Taliscicero Registered Member

    Joined:
    Feb 7, 2008
    Posts:
    1,439
    This is retarded, you can't use your phone while its in a Faraday cage so congratulations on making your phone useless your yourself as well, also potentially destroying it with the temperature or water damage. If they are speaking about the Chinese using it to listen to live conversations in that room it is moot also, why go through the trouble when you can wrap it in tin foil or simply put it in the other room or wrap it with a towel or take out the batteries. "Yes they say its no always true off" but for most phones it stops it from being used as a transmitter. Maybe I'm missing something here or are people retarded enough to do this?
     
  4. pajenn

    pajenn Registered Member

    Joined:
    Oct 26, 2009
    Posts:
    930
    Law enforcement agencies and intelligence services can remotely activate cell phone microphones and listen in through them, sometimes even if the phones are turned off as long as the battery hasn't been removed.

    There's a famous case where the FBI used this 'roving bug' technique to catch some mobsters. It came out during the prosecution; conversations recorded using this technique were ruled permissible.

    link: http://news.cnet.com/2100-1029-6140191.html
     
  5. Taliscicero

    Taliscicero Registered Member

    Joined:
    Feb 7, 2008
    Posts:
    1,439
    Try calling a phone that you put under a towel with you in the same room and see if you can hear yourself. 99% of the time you cannot. Its not like mobile phones use hyper sensitive government level directional microphones.
     
  6. pajenn

    pajenn Registered Member

    Joined:
    Oct 26, 2009
    Posts:
    930
    Sure, but a fridge may be more convenient and secure. I doubt normal fridge temperatures would damage mobile phones. After all, they are supposed to work outside in countries that experience subzero temperatures.
     
  7. Taliscicero

    Taliscicero Registered Member

    Joined:
    Feb 7, 2008
    Posts:
    1,439
    Still, there are far more simple ways.
     
  8. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    You're all wrong - I'd turn them off, remove the battery (if possible), place it in a hard drive or motherboard anti-static bag, wrap it in a towel, and *then* put it in the fridge :D

    PD
     
  9. S.B.

    S.B. Registered Member

    Joined:
    Jan 20, 2003
    Posts:
    150
    Frig storage most likely would prevent cellphone transception IMO -- BUT (and this is a really big 'but') storing cellphones upon parties' arrival only tip of iceberg;

    Tracking complete as soon as each party arrived at location. Frig storage no help here.

    Room itself could be bugged.​

    Why assume parties have only one cellphone per person?​

    Parties could carry alternative bugging devices.​

    Etcetera​


    This is security?

    __
     
  10. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    You can only do, what you can do. He hardly had access to a "bug sweep team", you know?

    PD
     
  11. Carver

    Carver Registered Member

    Joined:
    Feb 5, 2006
    Posts:
    1,910
    Location:
    USA
    The answer is simple
     

    Attached Files:

  12. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    clever advice in my opinion. i don't understand why people are mocking this guy.
     
  13. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    It's how they want to handle this kind of problem. Focus on the guy (Snowden), ridicule when ever possible, and avoid discussing what should be the real issue, the extent of their spying and surveillance under the guise of national security.
     
  14. Taliscicero

    Taliscicero Registered Member

    Joined:
    Feb 7, 2008
    Posts:
    1,439
    Its dumb, its like me building a nuclear bomb shelter just because nuclear weapons exist. Why put it in the fridge when you can just power it down/ turn off the network from inside the phone options.
     
  15. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Ha. For someone who was supposedly so learned enough in computer administration and schemery to gain entry to highly secured data, he must have failed basic chemistry.

    Try penetrating the atomic material element #82 known as simple lead. Blocks completely waves of all sorts.
     
  16. bigc73542

    bigc73542 Retired Moderator

    Joined:
    Sep 21, 2003
    Posts:
    23,934
    Location:
    SW. Oklahoma
    The cone of silence, I am sure that would work :ninja:
     
  17. Chuck57

    Chuck57 Registered Member

    Joined:
    Sep 2, 2002
    Posts:
    1,770
    Location:
    New Mexico, USA

    That's the real problem, and we don't know. If they can retrieve the information they've collected, even sending encryption keys to someone isn't secure anymore. Plus, besides collecting intelligence on Americans, who else have they been spying on? It's always been done, but not to this extent.

    Imagine, he went from being called a whistleblower and hero one day to traitor the very next.
     
  18. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Unless you exchange encryption keys in person, there's probably no way to hide the fact that you've given someone an encryption key. That said, if you're using strong encryption with asymetric keys (public/private), they have no way of using the public key for decryption.
    They'll continue to do so through conventional mass media. The rest of us don't have the kind of access needed to reach the majority of people. The rest of this story needs to be heard, mainly about how government and their big money overlords are the real traitors, to both the constitution and to humanity in general.
     
  19. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    +1,000,000 my friend. This is a standard tactic. I just laugh when I see it, and feel sorry for those that fall for it. Look at what Nixon tried with Ellsberg.

    The fridge thing was cool...I'd never trust that my visitors had truly turned their devices off, or hit record on an app.

    PD
     
  20. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Can you totally trust that powering it down does shut everything off, including GPS? I'm glad that I have no need for them.
     
  21. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Faraday cages work with anything that conducts electricity well. The key issue is hole size. Radiation with wavelenth longer than hole diameter is blocked. For example, holes in perforated metal shields in doors of microwave ovens block microwaves, but let visible light through.

    You'd need lead to block x-rays or gamma radiation. I wonder if it's possible to modulate gamma from small cesium-137 sources. That'd be very hard to block! But it'd also kill everyone nearby :(
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.