Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Who needs to break crypto when you have a baseband processor relay back location, audio and video?

[Citation really needed]



> Who needs to break crypto when you have a baseband processor relay back location, audio and video?

Not exactly a citation for the exact claim, but several people in this thread make the assertion that Qualcomm processors have some kind of location tracking service running on them, running under a parallel OS:

https://news.ycombinator.com/item?id=17081684

I think that's pretty close. The baseband processor is just one of the many hidden nooks that can run privacy-invading/security-breaking code outside of user view or control.

Also, I think it stands to reason that the baseband processor has everything it needs to at least relay a rough location: the list of in-range towers ~= user location, and it has full control of a channel to relay that information.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: