social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.8K
active users

#imsi

1 post1 participant0 posts today

Meet Rayhunter:
A New Open Source Tool from EFF to Detect Cellular Spying

At EFF we spend a lot of time thinking about Street Level Surveillance technologies
—the technologies used by police and other authorities to spy on you while you are going about your everyday life
—such as automated license plate readers,
facial recognition,
surveillance camera networks,
and cell-site simulators (. #CSS ).

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone,
regardless of technical skill,
to help search out CSS around the world.

CSS
(also known as #Stingrays or #IMSI #catchers)
are devices that masquerade as legitimate cell-phone towers,
tricking phones within a certain radius into connecting to the device rather than a tower.

CSS operate by conducting a general search of all cell phones within the device’s radius.

Law enforcement use CSS to pinpoint the location of phones
often with greater accuracy than other techniques such as cell site location information (CSLI)
and without needing to involve the phone company at all.

CSS can also log International Mobile Subscriber Identifiers (IMSI numbers) unique to each SIM card,
or hardware serial numbers (IMEIs) of all of the mobile devices within a given area.

Some CSS may have advanced features allowing law enforcement to intercept communications in some circumstances.

What makes CSS especially interesting, as compared to other street level surveillance, is that
so little is known about how commercial CSS work.

We don’t fully know what capabilities they have
or what exploits in the phone network they take advantage of to ensnare and spy on our phones, though we have some ideas.

We also know very little about how cell-site simulators are deployed in the US and around the world.

There is no strong evidence either way about whether CSS are commonly being used in the US to spy on First Amendment protected activities
such as protests, communication between journalists and sources, or religious gatherings.

There is some evidence
—much of it circumstantial
—that CSS have been used in the US to spy on protests.

There is also evidence that CSS are used somewhat extensively by US law enforcement,
spyware operators, and scammers.

We know even less about how CSS are being used in other countries,
though it's a safe bet that in other countries CSS are also used by law enforcement.

Much of these gaps in our knowledge are due to a lack of solid, empirical evidence about the function and usage of these devices.

Police departments are resistant to releasing logs of their use,
even when they are kept.

The companies that manufacture CSS are unwilling to divulge details of how they work.

Until now, to detect the presence of CSS, researchers and users have had to either rely on Android apps on rooted phones,
or sophisticated and expensive software-defined radio rigs.

Previous solutions have also focused on attacks on the legacy 2G cellular network, which is almost entirely shut down in the U.S.

Seeking to learn from and improve on previous techniques for CSS detection we have developed a better, cheaper alternative that works natively on the modern 4G network.

eff.org/deeplinks/2025/03/meet

Electronic Frontier Foundation · Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular SpyingRayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

#surveillance #IMSI #Cellphones

"CSS (also known as Stingrays or IMSI catchers) are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower.

"EFF's 'Rayhunter' works by intercepting, storing, and analyzing the control traffic (but not user traffic, such as web requests) between the mobile hotspot Rayhunter runs on and the cell tower to which it’s connected.

"Rayhunter works on a readily-available U$20 device.

eff.org/deeplinks/2025/03/meet

Electronic Frontier Foundation · Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular SpyingRayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Meet Rayhunter: A New Open Source Tool from @eff to Detect Cellular Spying

#Rayhunter works by intercepting, storing, and analyzing the control traffic (but not user traffic, such as web requests) between the mobile hotspot Rayhunter runs on and the cell tower to which it’s connected. Rayhunter analyzes the traffic in real-time and looks for suspicious events, which could include unusual requests like the base station (cell tower) trying to downgrade your connection to 2G which is vulnerable to further attacks, or the base station requesting your #IMSI under suspicious circumstances.

Rayhunter notifies the user when something suspicious happens and makes it easy to access those logs for further review, allowing users to take appropriate action to protect themselves, such as turning off their phone and advising other people in the area to do the same. The user can also download the logs (in PCAP format) to send to an expert for further review.

The default Rayhunter user interface is very simple: a green (or blue in colorblind mode) line at the top of the screen lets the user know that Rayhunter is running and nothing suspicious has occurred. If that line turns red, it means that Rayhunter has logged a suspicious event. When that happens the user can connect to the device's WiFi access point and check a web interface to find out more information or download the logs.

:black_sparkling_heart: eff.org/deeplinks/2025/03/meet

Electronic Frontier Foundation · Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular SpyingRayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

#Rayhunter works by intercepting, storing, and analyzing the control traffic between the mobile hotspot Rayhunter runs on and the cell tower to which it’s connected. Rayhunter analyzes the traffic in real-time and looks for suspicious events, which could include unusual requests like the base station (cell tower) trying to downgrade your connection to 2G which is vulnerable to further attacks, or the base station requesting your #IMSI under suspicious circumstances. #EFF

eff.org/deeplinks/2025/03/meet

Electronic Frontier Foundation · Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular SpyingRayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.
Replied in thread

@tauon

1) #CloudAct is just #CyberFacism, look it up!
en.wikipedia.org/wiki/CLOUD_Act

-

2) @signalapp 's #Server code is proprietary and since it's centralized we can't trust that the code they release is what's running on their backend!

-

3) #Signal still demands #PhoneNumbers which are #PII either by association (#Number => #ICCID = #SIM = #IMSI => #IMEI => Location Data as I explained beforetwice) or mandatory #KYC / #ID requirements (even on prepaid cards), which an increasing amount of juristictions do...

-

But don't take my word for it.
youtube.com/watch?v=tJoO2uWrX1M

en.wikipedia.orgCLOUD Act - Wikipedia
Replied in thread

@PC_Fluesterer

Hier noch ein sehr sinnvoller Tipp: Es laufen gerade bei Demonstrationen sogenannte #IMSI-CATCHER → en.wikipedia.org/wiki/IMSI-cat

Um wirkliche Sicherheit zu haben, sollte man das Gerät ausschalten und zusätzlich wie ein Butterbrot in Alufolie einpacken.

Danach hält das Ding auch wirklich den Mund, kann auch nicht mehr geortet werden ...

Besten Gruß

en.wikipedia.orgIMSI-catcher - Wikipedia

Starting all the way back on October 3rd, 2022, I used BloodFart@gmail.com as my log-in e-mail for free public WiFi access.

I don't insert a SIM card in my throw away phone & I connect to free WiFi for non-sensitive communications with a VPN. I understand that IMSI catchers exist too.

I chronicled this is previous (now deleted) posts. I've amalgamated all the times I've logged in in these posts, and some posts to follow.

Exhibit M, N, O, and P:

#WiFi#VPN#IMSI
Replied in thread

@halva @lynn @signalapp @deilann

The problem is one needs to literally acquire a phone number and have access to it, and the demand of a phone number itself is bad. This makes it unnecessarily complex and expensive compared to using @monocles / #monoclesChat.
(Cuz if I've to pay to communicate, I might just choose a provider that isn't a #VC #MoneyBurningParty but a long-term sustainable solution based off #OpenStandards!)

  • I'm sorry for your location. My sincere condolences!

Still, #Signal doesn't allow #SelfCustody of all the keys & #SelfHosting, which makes it vulnerable as a #proprietary #centralized, #SingleVendor & #SingleProvider solution.

And with #CloudAct on one hand and #Trump wanting to "Speedrun Hitler", I'd not rely on Signal.

  • The "Metadata" #FUD is just a marketing bs because Signal will comply with warrants, whereas nothing prevents me from buying a Thin client, setting up an #OnionService to tunnel everything over @torproject / #Tor and rig it to disconnect power if tampered with or upon command.

I have setup comms for critical operations (incl. helping people flee Russia!) and I'd rather choose #OnionShare over #Signal if #Metadata is a real concern.

  • Internet Access, even in "P.R." #China, is something feasible to workout given the massive prevalence of public #WiFi. Also it's easier to spoof/anonymize a MAC than an #IMEI or even #IMSI, so making one dependent on #PhoneNumbers to even sign up is inherently bad!
Twitterthaddeus e. grugq on Twitter“I’m gonna tell you a secret about “logless VPNs” — they don’t exist. Noone is going to risk jail for your $5/mo https://t.co/Q2aOQJkG4g”

#eBay Removes Listing for #StingRay #Cellphone #Spying Tech
StingRay listed at $100,000 before being removed for violating the platform’s policy on not #surveillance equipment. Listed as “Harris Stingray Cellular Phone Surveillance w/ Power Cord & Rolling Case - USED.
This StingRay may not be able to spy on modern phones. StingRays, and more broadly #IMSI-catchers, of which StingRay is a specific model, have been used by #lawenforcement in #US to track cell phones.
404media.co/ebay-removes-listi

The Next Generation of #Cell-Site Simulators (CSS) is Here. Here’s What We Know.
CSS, also known as #IMSI catchers, are among #lawenforcement’s most closely-guarded secret #surveillance tools. They act like real #cellphone towers, “tricking” mobile devices into connecting to them, designed to intercept the information that #phones send and receive, like the location of the user and metadata for #phone calls, text messages, and other app traffic.
eff.org/deeplinks/2024/06/next #privacy #EFF