this post was submitted on 21 Aug 2023
38 points (100.0% liked)

Asklemmy

1454 readers
59 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy πŸ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] RovingFox@infosec.pub 4 points 1 year ago (1 children)

Personally I'm worried to buy a phone that is filled with spyware and adware.

[–] Nemo@midwest.social 5 points 1 year ago (2 children)
[–] oessessnex@programming.dev 3 points 1 year ago (1 children)

On a phone with spyware installed that wouldn't do anything. There are probably ways to get rid of it, but how can you be sure?

[–] xeddyx@lemmy.nz 3 points 1 year ago (1 children)

By checking whether the bootloader is unlocked or not. If the bootloader is unlocked, then all bets are off, but if the bootloader is locked, you can only run the original, unmodified firmware. Any alternation to the firmware will result in the dm-verity check failing, causing the system to not boot at all. The only data which can be altered is user data, which is wiped in a factory reset. So a factory ressr definitely gets rid of it.

If you're paranoid though, you could always flash the stock firmware downloaded directly from the manufacturer's website, which will override all system partitions, so you can be absolutely sure there's no spyware - besides the spyware included by Google etc of course, or the spyware embedded into the hardware by the chip manufacturers...

[–] argv_minus_one 2 points 1 year ago

None of this will save you. The boot loader can be replaced with one that merely pretends to be locked and merely pretends to flash the replacement operating system it's sent over the USB port.

If the phone has ever been in the custody of someone you don't trust, you can't trust anything about it.

[–] UprisingVoltage@feddit.it 3 points 1 year ago (1 children)
[–] xeddyx@lemmy.nz 1 points 1 year ago (1 children)
[–] RovingFox@infosec.pub 2 points 1 year ago (1 children)

Those usually are made to persist after factory reset. The phone is rooted and factory reset is modified to not remove the bad software.

[–] xeddyx@lemmy.nz 1 points 1 year ago (1 children)

And rooting the phone requires an unlocked bootloader, which would present a warning when the phone is booted up.

[–] RovingFox@infosec.pub 2 points 1 year ago (1 children)

If you know what you are doing, it won't.

[–] xeddyx@lemmy.nz 1 points 1 year ago* (last edited 1 year ago) (1 children)

Yes it will. There's no way to bypass it, if there is, that would be a serious security flaw - the kind that would get patched very quickly. There have been some phones which had a vulnerable bootloader that allowed this in the past (eg: OnePlus devices), but there's no such exploit available for current generation devices

I'd like to see some sources backing up your claim, which is applicable to current generation phones.

[–] argv_minus_one 1 points 1 year ago (1 children)

There’s no way to bypass it, if there is, that would be a serious security flaw

Those do happen, but it is probably also possible to unlock the boot loader and then replace the boot loader itself with one that merely pretends to be locked. How would you know the difference?

the kind that would get patched very quickly.

Obviously criminals aren't going to install security patches for vulnerabilities that they are exploiting.

[–] xeddyx@lemmy.nz 1 points 1 year ago (1 children)

but it is probably also possible to unlock the boot loader and then replace the boot loader itself with one that merely pretends to be locked. How would you know the difference?

Sure, in theory, but doing that would require advanced knowledge, it's not something a random shady seller on eBay would do. With skills like that, they could easily get a high paying job, or if they really want to be a criminal, a better option would be getting into something like phishing or cryptolocking, which, skills wise, is easier than writing a custom bootloader.

Obviously criminals aren't going to install security patches for vulnerabilities that they are exploiting.

Which is why the first thing you should do is do a factory reset, update the phone, and do another factory reset. Or an even better option would be to just flash the factory firmware downloaded directly from the vendor.

[–] argv_minus_one 1 points 1 year ago (1 children)

Sure, in theory, but doing that would require advanced knowledge, it’s not something a random shady seller on eBay would do.

No. Writing the code to do that would require advanced knowledge, but once it's written, any common criminal can use it.

With skills like that, they could easily get a high paying job, or if they really want to be a criminal, a better option would be getting into something like phishing or cryptolocking, which, skills wise, is easier than writing a custom bootloader.

They could use the compromised phone they sell you to phish or ransom you.

Which is why the first thing you should do is do a factory reset, update the phone, and do another factory reset. Or an even better option would be to just flash the factory firmware downloaded directly from the vendor.

All of those only work if the software already on the phone allows them to work. Factory resets, updates, and USB flashing are all implemented by software.

[–] xeddyx@lemmy.nz 2 points 1 year ago* (last edited 1 year ago)

but once it's written, any common criminal can use it.

It's not that simple on ARM world, every device uses a different bootloader and has a different partition layout, different boot image resolutions and different type of warnings. So you'd have to a custom bootloader written for each model you sell, or just pick one model and reduce your audience.

They could use the compromised phone they sell you to phish or ransom you.

It's far more safer to just compromise a website or phish via emails/websites/fake apps, instead of selling malware on eBay and risk getting caught. And way way more easier to just make fake phone calls and pretend to be Microsoft support and then grab their credit cards or install malware on their PCs. So many easier and safer (anonymous) ways to scam people.

All of those only work if the software already on the phone allows them to work. Factory resets, updates, and USB flashing are all implemented by software.

Now you're entering the realm of really hypothetical scenarios here. Sure, what you're describing is theoretically possible, but faking the fastboot firmware is even more advanced than just simply patching the bootloader warning screen. If something like this was happening widely, we'd have heard about it by now. After all, Android phones have been around for 15 years. Now there have been a couple of instances of dodgy no-brand manufacturers/sellers shipping malware, but even these were just simple userland malware, nothing at the firmware level.

If you are that paranoid, then I guess you don't buy any piece of electronics from any retailer, and buy everything directly from the manufacturer always? I suppose you also walk directly to the factory, personally inspect the entire manufacturing and software development of the phone you intend to buy - because you don't trust the supply chain right? Sure, you may trust the manufacturer, but do you really trust the parcel package, the driver, the delivery person? Where do you draw the line exactly? Because in your hypothetical world, anyone can be a hacker right?