yes, thats what i meant,with another pc one would have to monitor all
incoming/outgoing packets/connections ;-).
My understanding is that you will not sniff anything if a tiny secret
computer (the real master on all peripherals), inside the same box, runs the
malware. You need another computer sniffing what is going in/out of the
monitored machine.
Maybe wireshark and other pieces of software I do not know about, are
relevant in order to disclose the
botnet and surveillance software should it be there.
Yes, you can monitor your network with a network sniffer (like with tcpdump)
(wireshark)ZenmapE, therApe is a nice friendly gui's.
Aside from the phone actually spying on it's users, metadata correlation,
network, tringualtion, isp..
Invisible Infrastructures : Surveillance Architecture
https://labs.rs/en/invisible-infrastructures-surveillance-achitecture/
let’s start from the beginning and explain the way a device
As far as I understand rms criticizes the way the technology was designed: by
triangulation, the phone operators can quite precisely locate its customers.
If the code running on the modem was free, that problem would persist.
@tonless: summing up what Soon.to.be.Free explained, Debian would