Transparency to discover surveillance

One relatively low-tech way to detect some of these types of surveillance might be to monitor either the power consumption of the modem or the power output on the antenna and compare it to what it’s been asked to do. If it’s covertly sending signals back to the base station(s) then it is going to be consuming and outputting more power, possibly in a distinctive pattern.

2 Likes

What is the current state of this now that the first phones are getting sent out?
How deep can people look into the network traffic on a librem 5?

as many people here on the forums keep saying “the rabbit hole goes deep”.

yes but it is not bottomless. what @patch was refering to is the following scenario.

you go down as deep as your “light” can take you untill you reach the “darkest” area and there you are greeted by “an electrified” fence that also blocks “light” from going past that point.

in this case your only choices are reverse-engineering (“permanent” but expensive) or if you want to audit simply wait for the “rabbit” to go outside and compare if what he carries is what he says he does (temporary but less expensive and not consistent thus less then ideal)

3 Likes