


Android 16 Will Tell You When Fake Cell Towers Try To Track Your Phone (androidauthority.com) 30
Android 16 will include a new security feature that warns users when their phones connect to fake cell towers designed for surveillance. The "network notification" setting alerts users when devices connect to unencrypted networks or when networks request phone identifiers, helping protect against "stingray" devices that mimic legitimate cell towers to collect data and force phones onto insecure communication protocols.
registered-only list. (Score:2)
Why don't telecons maintain a database of legitimate towers and send an updated list to one's phone every week or so? If you ride out of the area, a new list for the new area is downloaded just before you reach the boundary. (There might be special "starting" towers the world over in the local list.) The phone should only attempt communicating with towers in the database.
In emergencies such as 911 one could override that protection upon user confirmation.
Or do they spoof legitimate towers also? Seems they c
Re: (Score:2)
Re: (Score:2)
If they accidentally forget to put a tower in, they're gimping themselves -- not to mention some companies do cross-sharing agreements which would need to sync.
All the more reason becoming a certified legitimate cell tower should be quite the documented process, along with sustaining a more centralized list of registered legitimate towers that include hefty fines for lack of accuracy.
Most people won't be affected by Stingray like devices or fake towers. I bet even after this, most people won't even notice a difference.
Most people won't be falsely accused of a crime either. But when it does happen to someone, it's not exactly something you brush off and forget about in the manner you just described.
Re: (Score:2)
Who is "they"? The vendor would set up phones initially and test them. If by chance the phone can't find ANY usable towers, the phone can prompt the user for the option of having their phone ignore the registry (along with a stern warning).
Not a show-stopper, just need a decent Plan B.
I don't see why that's a problem. Vendors can include all registered
Re: (Score:2)
As many others have told you before, please get psychological help!
On top of that, as usual, you have absolutely no idea what you are talking about from a technical standpoint. You are simply trolling America from Asia where you live again!
Please listen to yourself, those people were talking to you. Joe Biden is not in the room with you right now.
Re: (Score:1)
The primary use of fake cell towers for tracking is police.
There is no law requiring you to carry your cell phone when leaving your residence. What now, police?
There is no law requiring you to carry your cell.. (Score:2)
...but the fact that a suspect normally did and suddenly didn't has been used as evidence against them.
Ignore this troll (was Re:Because cops) (Score:2)
The primary use of fake cell towers for tracking is police.
You’re leaning on half-truth as a rhetorical crowbar, and it’s a tired move. You're not here to unpack power or push for reform — you're here to poison the well. By flattening the issue into “cops bad, tech bad,” you strip away the nuance that actually matters: the lack of oversight, the secrecy, the legal gray zones that allow these tools to be used without accountability. You're not exposing injustice — you’re a grandstanding troll, not a dissenter. Just go away
Re: (Score:1)
And the majority of people here agree with me because they know. Even the ones that voted for Trump agree with me they just don't like to talk about it or about voting for Trump.
Re: (Score:2)
Phone-to-provider encryption seems like a better option. The only unencrypted information to start with would be your provider's ID, so your traffic is routed to their systems for decryption. Basically... my best current guess for greater security? Give up your mobile phone number, use data and a VOIP app. Then the cops will have to get a warrant (assuming your VOIP provider worries about that) not only to know the content of your conversation, but even to know who you called.
You're never going to be ab
Re: (Score:2)
Why don't telecons maintain a database of legitimate towers and send an updated list to one's phone every week or so? If you ride out of the area, a new list for the new area is downloaded just before you reach the boundary. (There might be special "starting" towers the world over in the local list.) The phone should only attempt communicating with towers in the database.
It’s a reasonable idea on paper, but cellular networks weren’t built with centralized tower authentication in mind — especially not legacy protocols like 2G and 3G, which are still widely used as fallbacks. Tower IDs aren’t verified cryptographically, and there’s no authoritative global list to push to phones in real time. Tower infrastructure changes constantly due to roaming agreements, maintenance, emergencies, and temporary deployments. A weekly "known good" sync would be
Re: (Score:1)
Okay, but they should require it for new or overhauled towers to start heading in that direction. Maybe give the industry a window of 5 to 10 years to add it.
Re: (Score:2)
Why don't telecons maintain a database of legitimate towers and send an updated list to one's phone every week or so?
That's how it used to work, although the update frequency was much less than 2 weeks. If you didn't update, you could even lose connectivity. And it was not transparent: you had to do something on your phone that disrupted usage, in order to download and install the tower update. They stopped doing all that, or made it totally transparent. It was probably too hard to keep their databases up to date.
Sure it will. (Score:4, Funny)
Re: (Score:2)
These are not the towers you're looking for.
Well this won't go over well with governments (Score:3)
How are they supposed to spy on journalists if they can't spoof cell towers and hack phones?
Cat's already out of the bag (Score:2)
This is too little, too late.
It's already become common to set up cellular hotspots where even picocell sites can't reach. It's also become common to set up phone-over-carrier-wifi where phones will connect to an org's wifi network specifically set up through an org like Ameriband where calls and texts tunnel to the carrier, but data is offloaded to the host org's corporate internet connection and thus their policies. And DAS has been around for so long that I've seen systems lifecycle, and then the lifec
Not for everyone, but crucial for a few (Score:3)
It's easy to dismiss fake cell towers as tin-foil hat stuff — until you read the court filings. Stingrays (aka IMSI catchers) are real, widely used by law enforcement, and rarely disclosed to the public. They're not some hobbyist-grade hacker toy — they're high-end surveillance gear.
What Android 16 is doing isn't magic; it's giving users visibility into when their phone gets bumped onto a sketchy, unencrypted channel — something that has real privacy implications, especially for high-risk individuals like journalists, activists, or whistleblowers. Next time you're near a protest, I suggest turning it on. If the crowd is big enough, some alphabet agency is probably hoovering up cell metadata. The FBI once logged license plates near demonstrations — this is the internet-era version of the same playbook.
Is it overkill for the average user? Probably. But the principle matters: people should at least know when their phone is being manipulated at the network level. You wouldn’t ignore a browser telling you your HTTPS connection was hijacked — why ignore your phone doing the same?
Not good enough (Score:2)
Better would be a setting that stops your phone connecting to an unencrypted network.
A Stingray may be the strongest signal in order to get switched to automatically, but it won't be the only signal of adequate strength.
Will cause confusion more than anything (Score:2)
Re: (Score:2)
Femtocells are common in many public places that where large numbers of people gather such as stadiums and malls. I doubt Google can easily tell the difference between these and a device such as a Stingray.
Femtocells are typically provider locked and should not break encryption. The ones in stadiums and malls should look identical to the ones on towers.
Re: (Score:2)
Re: (Score:2)
Will Android 16 display a permanent red alert... (Score:2)
Re: (Score:2)