For those of you who still use a smartphone, watch this first: https://www.youtube.com/watch?v=OINa46HeWg8
Scarily, this probably applies to the Cryptophone users too. Every mobile phone has, in addition to the main application side, a second low-level firmware OS that’s used to handle radio communications. This firmware is extremely complex and must be extremely reliable… which translates to it being extremely proprietary, using extremely old methodology (Hayes modem commands from the 80s!) and…
Where “buggy” is “send the right 73 bytes over the air and I’ll execute any code you want, yes-sir!”
Where “buggy” is “trusts everything it sees because everything it sees must be trustworthy.”
The upshot of all this? Not only can the NSA turn your phone into a listening and tracking and giving-you-cancer-extra-fast device, but any two-bit drug cartel with a couple hackers and an eBay account can too.
But wait — in the Shamwow tradition — there’s more!
As one commenter points out, even if they’re not quite this complex, mini-operating systems like this are present on hundreds of utility devices (routers, service providers, NSA listening stations, DSL modems) along the path your data takes every day to work in the morning. All of which are presumably of similar difficulty to compromise, even if you don’t carry them with you everywhere you go.
The clear solution? Talk your friend at CERN into doing a little 2AM testing of the LHC with a conveniently pocket-sized personal-tracking-device target for the beam. Bring vodka, hot women, and make a video!
Failing that, a slightly clower-to-home but equally brilliant suggestion from the louts in the /. comment department:
“In my house, we are putting in a charging station by the front door, where we will leave all phones. Guests will be cordially invited to leave their cell phones at the door, feel free to pick up a free charge for the ride home.
In the words of a Google employee, “Fuck these guys.”” 
And a possibly even more sinister idea… (thanks for the tip, you know who you are) Law enforcement running a mesh network to track EVERY WIRELESS CARD BY MAC ADDRESS IN SEATTLE. Kee-ripes!
 http://www.thestranger.com/seattle/you-are-a-rogue-device/Content?oid=18143845  http://mobile.slashdot.org/comments.pl?sid=4438813&cid=45411783
Wikileaks releases TPP draft. Intellectual property is a good thing —
it’s one of the few ways the average man can ethically escape the “gotta work all day to pay the rent” trap — but I don’t see much concern for the artists and average men here. http://wikileaks.org/tpp/
Next up, phased-array gaydar? New research suggests facial recognition algorithms of the future may be able to spot homosexuality. Whether Russia or Saudi Arabia have plans to couple this to sentry guns for “shoot on sight” functionality is unclear. Fortunately for equal rights, that capability is workable yet — at least, in public. Ft. Meade may be another matter… how else are they to spot the next Turing? http://www.numerama.com/magazine/27478-gay-ou-hetero-des-algorithmes-pourraient-le-deviner-a-partir-d-une-photo.html
Snowden’s almost broke. http://world.time.com/2013/11/12/edward-snowden-is-almost-broke/
Move over, Berlin — Canada is angling for status as Bitcoin capital of the world. Even a mining company there has gotten into the act, and BTC ATMs are already operating in Vancouver. http://rt.com/business/canada-mining-payment-bitcoins-628/
” I’ve always known this, and I’m sure most of you do too, but we never really talk about it. Every smartphone or other device with mobile communications capability (e.g. 3G or LTE) actually runs not one, but two operating systems. Aside from the operating system that we as end-users see (Android, iOS, PalmOS), it also runs a small operating system that manages everything related to radio. Since this functionality is highly timing-dependent, a real-time operating system is required.
This operating system is stored in firmware, and runs on the baseband processor. As far as I know, this baseband RTOS is always entirely proprietary. For instance, the RTOS inside Qualcomm baseband processors (in this specific case, the MSM6280) is called AMSS, built upon their own proprietary REX kernel, and is made up of 69 concurrent tasks, handling everything from USB to GPS. It runs on an ARMv5 processor.
The problem here is clear: these baseband processors and the proprietary, closed software they run are poorly understood, as there’s no proper peer review. This is actually kind of weird, considering just how important these little bits of software are to the functioning of a modern communication device. You may think these baseband RTOS’ are safe and secure, but that’s not exactly the case. You may have the most secure mobile operating system in the world, but you’re still running a second operating system that is poorly understood, poorly documented, proprietary, and all you have to go on are Qualcomm’s Infineon’s, and others’ blue eyes.
The insecurity of baseband software is not by error; it’s by design. The standards that govern how these baseband processors and radios work were designed in the ’80s, ending up with a complicated codebase written in the ’90s – complete with a ’90s attitude towards security. For instance, there is barely any exploit mitigation, so exploits are free to run amok. What makes it even worse, is that every baseband processor inherently trusts whatever data it receives from a base station (e.g. in a cell tower). Nothing is checked, everything is automatically trusted. Lastly, the baseband processor is usually the master processor, whereas the application processor (which runs the mobile operating system) is the slave. […]
With this in mind, security researcher Ralf-Philipp Weinmann of the University of Luxembourg set out to reverse engineer the baseband processor software of both Qualcomm and Infineon, and he easily spotted loads and loads of bugs, scattered all over the place, each and every one of which could lead to exploits – crashing the device, and even allowing the attacker to remotely execute code. Remember: all over the air. One of the exploits he found required nothing more but a 73 byte message to get remote code execution. Over the air.
You can do some crazy things with these exploits. For instance, you can turn on auto-answer, using the Hayes command set. This is a command language for modems designed in 1981, and it still works on modern baseband processors found in smartphones today (!). The auto-answer can be made silent and invisible, too.
While we can sort-of assume that the base stations in cell towers operated by large carriers are “safe”, the fact of the matter is that base stations are becoming a lot cheaper, and are being sold on eBay –
and there are even open source base station software packages. Such base stations can be used to target phones. Put a compromised base station in a crowded area – or even a financial district or some other sensitive area – and you can remotely turn on microphones, cameras, place rootkits, place calls/send SMS messages to expensive numbers, and so on. Yes, you can even brick phones permanently.
This is a pretty serious issue, but one that you rarely hear about. This is such low-level, complex software that I would guess very few people in the world actually understand everything that’s going on here.
That complexity is exactly one of the reasons why it’s not easy to write your own baseband implementation. The list of standards that describe just GSM is unimaginably long – and that’s only GSM. Now you need to add UMTS, HSDPA, and so on, and so forth. And, of course, everything is covered by a ridiculously complex set of patents. To top it all off, communication authorities require baseband software to be certified.
Add all this up, and it’s easy to see why every cellphone manufacturer just opts for an off-the-shelf baseband processor and associated software. This does mean that each and every feature and smartphone has a piece of software that always runs (when the device is on), but that is essentially a black box. Whenever someone does dive into baseband software, many bugs and issues are found, which raises the question just how long this rather dubious situation can continue. “