Orbic Hotspot and Rayhunter: DIY Shield Against Invisible Cell-Site Spying
The focus is on 'Rayhunter,' an open-source tool from the EFF designed to detect cellular spying by monitoring control traffic. The tool requires an Orbic mobile hotspot, which costs around $20 or less, to operate.
Comments center on the tool's mechanism: it analyzes real-time 'control traffic' between the hotspot and cell towers, specifically hunting for suspicious activity. Users noted that Rayhunter flags actions like a base station trying to downgrade a connection to vulnerable 2G or suspicious IMSI requests. Badwetter asserted the tool aims to give all technical skill levels the power to find cell-site simulators (CSS) globally.
The discussion presents a technical briefing on a detection method. The weight of the provided statements is purely informational, detailing how a specific tool works to counter alleged surveillance tactics.
Key Points
#1The tool, Rayhunter, is an open-source project.
pelespirit stated this, defining it as a system built to run on an Orbic mobile hotspot.
#2Detection hinges on analyzing 'control traffic'.
pelespirit explained the system examines real-time data exchange between the hotspot and the cell tower for anomalies.
#3Specific threats include connection downgrades and IMSI sniffing.
pelespirit detailed that suspicious events include base stations attempting 2G downgrades or suspicious IMSI requests.
#4The goal is accessible global search for CSS.
badwetter stated the tool aims to empower users of all technical skill levels to locate cell-site simulators worldwide.
Source Discussions (3)
This report was synthesized from the following Lemmy discussions, ranked by community score.