Franz: > On Wed, Feb 1, 2017 at 2:13 AM, Chris Laprise <tas...@openmailbox.org> > wrote: > >> On 01/31/2017 10:47 PM, Gaiko Kyofusho wrote: >> >>> I keep reading examples where people are using something like mobile >>> routers between thier phone/computer and public wifi spots, example like >>> the blackholecloud <https://blackholecloud.com/>device or apparently >>> Mike Perry of the tor project told arstechnica < >>> https://arstechnica.com/security/2016/11/tor-phone-prototyp >>> e-google-hostility-android-open-source/>that "He suggests leaving the >>> prototype in airplane mode and connecting to the Internet through a second, >>> less-trusted phone, or a cheap Wi-Fi cell router." >>> >> >> This is pretty dubious advice. What is to stop an attacker from breaking >> into the mobile router and using that as an attack platform to break into >> your main device? A few minutes...?
The point of Mike Perry's strategy is to (1) protect against baseband access/tracking by only using a phone's WiFi and to (2) protect against the current poor situation of firewalling in Android to *protect against non-Tor identity leaks*. It seems pretty orthogonal to what you want to discuss with this thread - using mobile routers as a firewall for non-phone devices (Qubes) against active attackers. -- Michael Carbone Qubes OS | https://www.qubes-os.org @QubesOS <https://www.twitter.com/QubesOS> PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5afcadcd-76ec-2e21-1c2e-50349051401e%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.