Just wanted to advertise that the EFF recently released an open source tool for detecting cell-site simulators. The hardware is like $20 and it's pretty easy to setup yourself. Worth having around to stay aware of what's out there, especially if you live in one of the places recently targeted by the administration.https://github.com/EFForg/rayhunter/
perihelions|5 months ago
Microsoft has billions of dollars in US intelligence-cloud contracts and should leap at a chance to get an edge in on those. They've done things like this before; they provided incredible (and illegal!) cooperation with the NSA back at the time of the Snowden Leaks[0].
[0] https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-... ("Microsoft handed the NSA access to encrypted messages" (2013))
throw0101d|5 months ago
Isn't a git commit trail basically a Merkle tree of checksums? If any developer tried to do a pull or fetch they'd suddenly get a bunch of strange commit messages, wouldn't they?
Also: code signing is / can become a thing.
aduffy|5 months ago
untitaker_|5 months ago
unknown|5 months ago
[deleted]
EvanAnderson|5 months ago
HumblyTossed|5 months ago
nobody9999|5 months ago
Sadly, it's only available in the Google/Apple stores (if anyone knows of a similar tool that's available elsewhere, I'd love to hear about it!)
It allows me to locate the "cell towers" I'm connecting to and that are nearby, as well as the devices around me, and will map them for me.
In fact, several years ago, I noted a brand spanking new "cell tower a block or so away (this is in NYC) that appeared to be in the street(!). It stayed there for a couple weeks and then was gone. It sure seemed like it was an IMSI catcher[1].
It's not directly the feature set you suggest, but can certainly be used to identify the towers near you -- and any new ones that might "pop up."
[0] https://play.google.com/store/apps/details?id=com.wilysis.ce...
[1] https://en.wikipedia.org/wiki/IMSI-catcher
Edit: Another comment (https://news.ycombinator.com/item?id=45189302 ) mentioned snoopsnitch (https://github.com/srlabs/snoopsnitch ) and other tools which, apparently can do similar (and more apropos to the topic at hand) things as Network Cell Info Lite.
riedel|5 months ago
Edit: Interesting also the collection of network security via gsmmap [2]
[0] https://gitweb.stoutner.com/?p=PrivacyCell.git;a=summary
[1] https://github.com/srlabs/snoopsnitch [2] https://gsmmap.org/
junebash|5 months ago
neilv|5 months ago
An enthusiastic and muddle-headed person might get inspired by disposable Internet chatter, and then go and get themselves sent to federal prison (or worse).
Also, I suspect that an attack like that would only justify (or be used as a pretext for) additional actions that are undesirable to the perpetrator.
bigfatkitten|5 months ago
dylan604|5 months ago
Imustaskforhelp|5 months ago
elihu|5 months ago
anonymousiam|5 months ago
I wonder what their lawyers think of this.
https://bja.ojp.gov/program/it/privacy-civil-liberties/autho...
like_any_other|5 months ago
aduffy|5 months ago
nxobject|5 months ago
trympet|5 months ago
dang|5 months ago
Rayhunter – Rust tool to detect cell site simulators on an orbic mobile hotspot - https://news.ycombinator.com/item?id=43283917 - March 2025 (23 comments)
jimt1234|5 months ago
boston_clone|5 months ago