Google’s latest flagship smartphone raises concerns about user privacy and security. It frequently transmits private user data to the tech giant before any app is installed. Moreover, the Cybernews research team has discovered that it potentially has remote management capabilities without user awareness or approval.

Cybernews researchers analyzed the new Pixel 9 Pro XL smartphone’s web traffic, focusing on what a new smartphone sends to Google.

“Every 15 minutes, Google Pixel 9 Pro XL sends a data packet to Google. The device shares location, email address, phone number, network status, and other telemetry. Even more concerning, the phone periodically attempts to download and run new code, potentially opening up security risks,” said Aras Nazarovas, a security researcher at Cybernews…

… “The amount of data transmitted and the potential for remote management casts doubt on who truly owns the device. Users may have paid for it, but the deep integration of surveillance systems in the ecosystem may leave users vulnerable to privacy violations,” Nazarovas said…

    • Buddahriffic@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      24 days ago

      I was just wondering earlier today if Google kept the bootloader open to allow custom OS installation only because they had other hardware on the phone that would send them their information anyways, possibly through covert side channels.

      Like they could add listeners for cell signals that pick up data encoded in the lower bits of timestamps attached to packets, which would be very difficult to detect (like I’m having trouble thinking of a way to determine if that’s happening even if you knew to look for it).

      Or maybe there’s a sleeper code that can be sent to “wake up” the phone’s secret circuitry and send bulk data when Google decides they want something specific (since encoding in timestamps would be pretty low bandwidth), which would make detection by traffic analysis more difficult, since most of the time it isn’t sending anything at all.

      This is just speculation, but I’ve picked up on a pattern of speculating that something is technically possible, assuming there’s no way they’d actually be doing that, and later finding out that it was actually underestimating what they were doing.

      • MajorHavoc@programming.dev
        link
        fedilink
        arrow-up
        2
        ·
        19 days ago

        This is just speculation, but I’ve picked up on a pattern of speculating that something is technically possible, assuming there’s no way they’d actually be doing that, and later finding out that it was actually underestimating what they were doing.

        As the saying goes, just because you’re paranoid, doesn’t mean you’re wrong.

        The answer that will put this question to bed is open source hardware. Thankfully we’re close to having viable options, finally.

      • Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        24 days ago

        I don’t mean to discredit your opinion, but it is pure speculation and falls in the category of conspiracy theories. There are plenty of compelling arguments, why this is likely completely wrong:

        • Google Pixels have less than 1% of the global smartphone market share, in fact, they are currently only sold in 12 (the Pixel 9 is sold in 32 countries, my bad, I had an outdated number in mind) countries around the world. Do you really think that Google would spend all the money in research, custom manufacturing, software development and maintenance to extract this tiny bit of data from a relatively small number of users? I’d say more than 90% of Pixel owners use the Stock OS anyways, so it really doesn’t matter. And Google has access to all the user data on around 70% of all the smartphones in the world through their rootkits (Google Play services and framework, which are installed as system apps and granted special privileges), which lets them collect far more data than they ever could from Pixel users.
        • Keeping this a secret would also immensely difficult and require even more resources, making this even less profitable. Employees leave the company all the time, after which they might just leak the story to the press, or the company could get hacked and internal records published on the internet. Since this would also require hardware modifications, it’s also likely that it would get discovered when taking apart and analyzing the device. PCB schematics also get leaked all the time, including popular devices like several generations of iPhones and MacBooks.
        • Lastly, the image damage would be insane, if this ever got leaked to the public. No one would ever buy any Google devices, if it was proven that they actually contain hardware backdoors that are used to exfiltrate data.
        • Buddahriffic@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          24 days ago

          You’re right that it’s pure speculation just based on technical possibilities and I hope you’re right to think it should be dismissed.

          But with the way microchip design (it wouldn’t be at the PCB level, it would be hidden inside the SoC) and manufacturing work, I think it’s possible for a small number of people to make this happen, maybe even a single technical actor on the right team. Chips are typically designed with a lot of diagnostic circuitry that could be used to access arbitrary data on the chip, where the only secret part is, say, a bridge from the cell signal to that diagnostic bus. The rest would be designed and validated by teams thinking it’s perfectly normal (and it is, other than leaving an open pathway to it).

          Then if you have access to arbitrary registers or memory on the chip, you can use that to write arbitrary firmware for one of the many microprocessors on the SoC (which isn’t just the main CPU cores someone might notice has woken up and is running code that came from nowhere), and then write to its program counter to make it run that code, which can then do whatever that MP is capable of.

          I don’t think it would be feasible for mass surveillance, because that would take infrastructure that would require a team that understands what’s going on to build, run, and maintain.

          But it could be used for smaller scale surveillance, like targeted at specific individuals.

          But yeah, this is just speculation based on what’s technically possible and the only reason I’m giving it serious thought is because I once thought that it was technically possible for apps to listen in on your mic, feed it into a text to speech algorithm, and send it back home, hidden among other normal packets, but they probably aren’t doing it. But then I’d hear so many stories about uncanny ads that pop up about a discussion in the presence of the phone and more recently it came out that FB was doing that. So I wouldn’t put it past them to actually do something like this.

          • Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            24 days ago

            But it could be used for smaller scale surveillance, like targeted at specific individuals

            Why would this only be present in Pixels then? Google isn’t interested in specific people. Intelligence agencies are. This would mean, that every phone in the world needs to be compromised using this sophisticated, stealthy technology, which is even more unlikely.

            • Buddahriffic@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              24 days ago

              If it is present there, it doesn’t imply it’s only present there.

              And we really have no idea how close of a relationship Google, or any other corp for that matter, has with various intelligence agencies. Same thing with infiltrations by intelligence agencies.

              And no, it doesn’t mean that every phone in the world is compromised with this, which wouldn’t be that sophisticated, just stealthy. The sophisticated part would be part of the normal design process, it’s called DFT or design for test if you want to read about it, used legitimately to determine what parts of the chip have manufacturing flaws for chip binning.

              Most phones don’t have an unlocked bootloader, and this post is about the data Google is pulling on factory pixels.

              Why would they do all the work on the software side and then themselves offer a device that allows you to remove their software entirely? And if it’s worth it just from the “make more money from people who only want unlocked phones”, why isn’t it more common?

              Mind you, my next phone might still be a pixel. Even if this stuff is actually there, I wouldn’t expect to be targeted. I can’t help but wonder about it, though, like just how deep does the surveillance or surveillance potential go?

    • averyminya@beehaw.org
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      23 days ago

      I will never understand buying a google phone just to deGoogle it. why would you give them money.

      I’ve seen the reasoning, I just …

  • ExtremeDullard@lemmy.sdf.org
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    25 days ago

    Who truly owns the device is a question that has been answered ever since Android came into being.

    Ask yourself: do you have root access to YOUR phone? No you don’t: Google does.

    It’s the so-called “Android security model”, which posits that the users are too dumb to take care of themselves, so Google unilaterally decides to administer their phone on their behalf without asking permission.

    Which of course has nothing to do with saving the users from their own supposed stupidity and everything to do with controlling other people’s private property to exfiltrate and monetize their data.

    How this is even legal has been beyond me for 15 years.

    • Ephera@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      25 days ago

      Yep, what radicalized me against Google was all the way back when they had bought Android and rolled out the Play Store for the first time.

      I was on my first-ever phone, and yes, it did have rather limited internal storage, but then the Play Store got installed, taking up all the remaining space. I had literally around 500KB of free storage left afterwards, making it impossible to install new apps.

      Couldn’t uninstall the Play Store, couldn’t move it to the SD-card and it didn’t even fucking do anything that the Android Market app didn’t do. It just took up 40MB more space for no good reason.

    • cm0002@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      25 days ago

      do you have root access to YOUR phone?

      Yes. On a Pixel 9 Pro Fold.

      Ironically, Google Pixels are among the few (US available) brands that still let you fully unlock the BL

      • ExtremeDullard@lemmy.sdf.org
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        25 days ago

        Yes. On a Pixel 9 Pro Fold.

        Not if you run the stock OS you don’t.

        My comment was generic. The vast majority of Android users don’t unlock their bootloader and install a custom ROM. The people who do that are fringe users.

        My point was that when the normal state of affairs is Google controlling YOUR property that YOU paid with YOUR hard-earned, and you have to be technically competent and willing to risk bricking your device to regain control, that’s full-blown dystopia right there.

        • Vik@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          25 days ago

          out of interest, what use cases do you have in mind that require root access?

          I used to use a root based solution to block ads system wide via hosts but now I just use ublock origin in Firefox.

          • MasterBuilder@lemmy.one
            link
            fedilink
            arrow-up
            1
            ·
            12 days ago

            That only blocks for the browser. What about your apps? I never see add banners or popups in apps as i use adaway. Further, I can customize with well maintained blocklists that include other categories like malware and harvesting sites.

            • Vik@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              12 days ago

              I’m aware, I used to use adaway several years ago.

              I had the same feelings as you, in that I needed to have system-wide ad blocking, but I revaluated that requirement a couple years ago and realised that I don’t use any apps featuring banner ads and such.

              Several of my apps will just fall back to system webview and Firefox (+uBo) will power that too.

          • FuzzyRedPanda@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            24 days ago

            AdAway, AFWall+ (for restricting network access to apps), Root File Explorer (needed to get my watch working with GadgetBridge), Permission Manager X, Xposed Edge Pro (for hardware keys remapping), Pixels (for a hardware display fix)

            • Vik@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              24 days ago

              Adaway was what I used prior to ublock origin on Firefox. The network access toggles can be found directly in ROMs like Calyx Grapene, Lineage, Divest, though I’m not sure if they’re widely seen elsewhere.

              I know the process you’re referring you WRT gadgetbridge. I used to do the same thing until I switched to a pinetime.

              I’m not familiar with permission manager X. Does that deviate from the android permissions framework in some way?

              Can you tell me more about the hardware tweaks?

              • FuzzyRedPanda@lemm.ee
                link
                fedilink
                English
                arrow-up
                1
                ·
                21 days ago

                Permission Manager X gives the user fine grain control over pretty much every permission an app has, moreso than the built in Android permissions settings. I was trying to use it to keep certain apps from starting automatically at boot.

                As far as the hardware tweaks, my Xperia has an “assistant button” on the side of the phone, but since I don’t use google assistant or anything, Xposed Edge Pro lets me remap it to do basically anything, even when the screen is off. I have it set to play/pause my music even when the screen is off, but only if headphones are connected.

                • Vik@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  21 days ago

                  I see. I admit I sorely missed the app startup at boot control permission (app ops) toggle when it was removed from the Android permissions framework, but the new power and background software management framework eliminates the need for it.

                  Also damn, you have a modern xperia? Hardware wise they are massively appealing to me. They have nearly all of the HW amenities I can think of (SD card slot, headphone jack, dedicated FP reader / button, notification LED, no camera cutout).

                  If they supported bootloader relocking with sself signed keys, they’d be the perfect phone for me.

                  I made the admittedly difficult discussion to move to a Pixel so I could use some of the most private and secure software possible on android with little effort or thought behind it.

                  I sorely miss my headphone jack but at least I feel like I can depend on this tiny computer to not fuck me over with unfettered personal data collection (and save a lot of power in doing so, I suppose).

    • circuscritic@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      25 days ago

      Please read the many write-ups by developers of well regarded privacy and security ROMs, such as grapheneOS and divestOS.

      Who detail in great length why root access is a bad idea, and why many apps that require root access, are just poorly developed security nightmares.

      That said, I agree that it should be an option, or at least a standardized means of enabling it. As well as all bootloaders should be unlockable. But phones are more personal devices than the PC ever was, and there are good reasons NOT to push for the proliferation of standardized root access.

      • selokichtli@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        24 days ago

        Yes. It is the principle, everyone should be informed of the security risks, but not stripped of the root privileges they keep for themselves.

      • daddy32@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        24 days ago

        These writeups never managed to to convince me me that I should not be able to modify any file on my device. If the system is not able to grant this access to me, and me only, while doing it securely, than it’s bad operating system, designed without my interests first on mind. I am absolutely sure that granting so-called “root access” can be done securely, as decades of almost-every-other-OS have shown.

      • Psyhackological@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        24 days ago

        I have GrapheneOS and I know having root is not ideal and I was wondering about https://shizuku.rikka.app/ It looks like a more elegant way to have for some apps higher privileges while preserving security but I’m not sure about it so I’m thinking out loud

        • circuscritic@lemmy.ca
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          24 days ago

          I will admit that I also use Shizuku, but I only enable it for short bursts when I need access for a very select number of precise use cases. Immediately afterwards, I reboot.

          I also assume that if I spent any amount of time digging into it, I would realize it’s a bad idea, but nothing’s perfect.

          And don’t assume that all apps allowing Shizuku access were developed securely, or that there all developers have good intentions. Really I only use it for Swift, or if I’m really behind on my updates, I’ll briefly allow Droidify access for hands off updating.

          • Psyhackological@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            22 days ago

            Is rebooting disables Shizuku?

            How do you do these short bursts? Through adb?

            And still Shizuku seems like a better idea than rooting the smartphone.

  • skuzz@discuss.tchncs.de
    link
    fedilink
    arrow-up
    2
    ·
    25 days ago

    I know this isn’t the topic here, but I really wish these researchers would unroll what all Apple harvests from Apple devices. It’s quite a lot as well. Could help pop that “we’re so private” myth.

  • DavidGarcia@feddit.nl
    link
    fedilink
    arrow-up
    0
    ·
    25 days ago

    It’s so ironic that Pixels are the go to devices for privacy roms these days.

    All this shit is probably happening at the hardware level too, with 100 different backdoors you can’t remove with your megamind plan of installing a custom rom.

    The silicon probably has the ability to live stream all sensor data directly to the NSA using the fanciest ML compression technology lmao.

    • ExtremeDullard@lemmy.sdf.org
      link
      fedilink
      arrow-up
      1
      ·
      25 days ago

      It’s so ironic that Pixels are the go to devices for privacy roms these days.

      It’s so ironic it’s a show-stopper for me. I’m not paying fucking Google to escape the Google dystopia. Nosiree! That’s just too rich for me.

      This is why I own a Fairphone running CalyxOS. Yes, I know GrapheneOS is supposedly more secure - I say supposedly because I think 95% of users don’t have a threat model that justifies the extra security really. But I don’t care: my number one priority is not giving Google a single cent. If it means running a less secure OS, I’m fine with that.

      There’s no way on God’s green Earth I’m buying a Pixel phone to run a deGoogled OS. That’s such an insane proposition I don’t even know how anybody can twist their brain into believing this is a rational thing to do.

    • smeg@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      25 days ago

      Citation needed. I get that it’s healthy not to trust anyone, but with the amount of security research that goes into these devices if something like that was happening then we would know about it.

    • Southern Boy@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      25 days ago

      What is the advantage over Calyx/Lineage/iode OS on compatible devices? I just don’t want Google to have any of my money at all. Buying a privacy solution from them recoups their loss.

      • Tazerface@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        24 days ago

        I don’t know about Calyx or Iode but Lineage doesn’t allow for a locked bootloader. This is a massive security hole and without security, sooner or later, your privacy will be violated.

        Currently, GrapheneOS on a newer Pixel are the only phones that Celebrite can’t breach. Celebrite machines are cheap enough that the border guards and your local cops probably have one. In my country, it’s the law that a cop is allowed to examine a phone during a traffic stop.

        • Chulk@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          16 hours ago

          In my country, it’s the law that a cop is allowed to examine a phone during a traffic stop.

          One underrated feature of the Graphene OS is that you can set a duress PIN that wipes your entire phone when entered.

          • Tazerface@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            12 hours ago

            I have the duress pin/password set, the pin is written on a post-it in the case.

            I should clarify, the cop can give the phone a once over but not connect to a machine or clone the phone. Cloning is a bit more involved - legally speaking.

            • Chulk@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 hours ago

              Oh, I was mostly leaving the comment for other people who might be interested in the feature.

              the pin is written on a post-it in the case.

              That’s not a bad idea. If someone steals the phone, they might inadvertently erase it for you if they find that post-it.

      • VARXBLE@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        24 days ago

        Mainly the locked bootloader that GrapheneOS offers. It’s more secure, and GrapheneOS emphasizes security over all else, but privacy features are part of that security.

      • RubberElectrons@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        24 days ago

        I like calyx, might try graphene some day. But I absolutely won’t run Google’s play services ala graphene. It’s sandboxed, supposedly, but why run it at all?

        Calyx uses microG, a much smaller, fully open source emulator of Google’s services.

        • Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          23 days ago

          but why run it at all?

          Because it is unfortunately required by some apps. microG is not a viable alternative, as it requires root access on the device, which drastically reduces the security. It also has worse compatibility than Sandboxed Play services, and doesn’t offer much of a benefit. It still downloads and executes proprietary Google blobs in the background in order to function. Apps that require Google services also include a proprietary Google library, making microG essentially useless. It’s an open source layer that sits between a proprietary library and a proprietary network service, using proprietary binaries and requiring root access. You gain absolutely nothing from using it, and significantly increases the attack surface of your device.

          fully open source emulator

          This is simply false, as I explained, only a tiny bit of what microG requires to function is open source

          You’re far better off using Sandboxed Play services on GrapheneOS

          • RubberElectrons@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            24 days ago

            Just about all of your identifying data is stripped out by the framework before interacting with Google at all: https://github.com/microg/GmsCore/wiki/Google-Network-Connections

            That alone makes it an important tool. I’m not too worried about memory exploits as I don’t really install apps, but it’s an important feature in graphene’s toolkit.

            For most people who want an Android alternative that’s open source but don’t have time to fiddle with it, calyxOS seems like a good solution. It just works out of the box.

      • yonder@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        25 days ago

        It’s my understanding that Graphene has security as its main goal, not privacy, though it’s also quite private.

  • sub_ubi@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    25 days ago

    GrapheneOS + buy your phone from a store in-case you’re allergic to PETN