Skip to main content

Android 16 will soon flag fake cell towers and warn you if someone is spying on your phone

Web Hosting & Remote IT Support
  • Android 16 will include alerts for fake cell towers and suspicious networks
  • Update detects ‘stingray’ devices which pose as cell towers
  • Feature likely to arrive with devices that launch on Android 16

Not every mobile network is what it seems. If your smartphone unwittingly connects to a fake cell tower, it could expose your private data to interception. Fortunately, Google is doing something about it: a new security feature in Android 16 is designed to detect suspicious connections and warn you if someone is trying to eavesdrop on your calls and texts.

Cell mast simulators, known as ‘stingray’ devices, create a phoney (pun intended) signal which can trick your mobile into revealing your location and communications. It’s a tricky tactic that’s previously been undetectable to smartphone users. Until now, users have had a very limited toolkit to protect themselves.

To tackle the risk of silent spying, Google has developed a warning system which detects these rogue networks and flags when a connection is not what it seems. Expected to arrive with new Android 16 devices, it’s a background feature with big implications for privacy.

No more phoney towers

Stingrays work by mimicking cell towers. When a smartphone connects to the fake network, its operator can track the device and harvest data, including unique identifiers such as the IMEI. It can also transfer the device to a less secure network in order to intercept calls and messages – all without any indication to the targeted user.

A kind of IMSI catcher, stingrays are known to be used by law enforcement agencies. While they’re sometimes justified in the name of national security, they also have the potential for misuse, particularly if they fall into the hands of nefarious actors.

Stingray devices generally use 2G to target smartphones. Even if you’re on 4G or 5G, most phones can fall back to 2G. This built-in vulnerability can be exploited by stingrays: by broadcasting a strong 2G signal, they can trick nearby devices into connecting. Because 2G networks lack modern encryption standards and don’t authenticate towers, your phone can’t verify if they’re real.

Right now, the best way to protect yourself against stingray attacks is to disable 2G network connectivity altogether.

The Android 16 update adds another layer of protection. According to developer notes on the Android Open Source Project, it introduces ‘network notification’ warnings. Compatible phones will be able to detect when a mobile network requests the device’s identifiers or tries to force it onto an unencrypted connection. Both of these events will be flagged to the end user.

The feature can be configured under ‘Mobile network security’ in the settings menu, alongside the option to enable 2G network protection. The problem is that no Android phones actually have the hardware required to unlock the feature – not even the best Pixel phones. That’s why the setting is currently hidden.

As a result, it’s likely that the first Android phones with the ability to detect fake cell towers will launch later this year. There’s a good chance it will debut on the Google Pixel 10, which might just make it the most secure smartphone ever.

You might also like...



via Hosting & Support

Comments

Popular posts from this blog

Microsoft, Google, and Meta have borrowed EV tech for the next big thing in data centers: 1MW watercooled racks

Web Hosting & Remote IT Support Liquid cooling isn't optional anymore, it's the only way to survive AI's thermal onslaught The jump to 400VDC borrows heavily from electric vehicle supply chains and design logic Google’s TPU supercomputers now run at gigawatt scale with 99.999% uptime As demand for artificial intelligence workloads intensifies, the physical infrastructure of data centers is undergoing rapid and radical transformation. The likes of Google, Microsoft, and Meta are now drawing on technologies initially developed for electric vehicles (EVs), particularly 400VDC systems, to address the dual challenges of high-density power delivery and thermal management. The emerging vision is of data center racks capable of delivering up to 1 megawatt of power, paired with liquid cooling systems engineered to manage the resulting heat. Borrowing EV technology for data center evolution The shift to 400VDC power distribution marks a decisive break from legacy sy...

Google’s AI Mode can explain what you’re seeing even if you can’t

Web Hosting & Remote IT Support Google’s AI Mode now lets users upload images and photos to go with text queries The feature combines Google Gemini and Lens AI Mode can understand entire scenes, not just objects Google is adding a new dimension to its experimental AI Mode by connecting Google Lens's visual abilities with Gemini . AI Mode is a part of Google Search that can break down complex topics, compare options, and suggest follow-ups. Now, that search includes uploaded images and photos taken on your smartphone. The result is a way to search through images the way you would text but with much more complex and detailed answers than just putting a picture into reverse image search. You can literally snap a photo of a weird-looking kitchen tool and ask, “What is this, and how do I use it?” and get a helpful answer, complete with shopping links and YouTube demos. AI Eyes If you take a picture of a bookshelf, a plate of food, or the chaotic interior of your junk...

Passing the torch to a new era of open source technology

Web Hosting & Remote IT Support The practice of developing publicly accessible technologies and preventing monopolies of privately-owned, closed-source infrastructure was a pivotal technological movement in the 1990s and 2000s. The open source software movement was viewed at the time as a form of ‘digital civil duty’, democratizing access to technology. However, while the movement's ethos underpins much of today’s technological landscape, its evolution has proven to be a challenge for its pioneers. Hurdles Facing Young Developers Open source models successfully paved a path for the development of a multitude of technologies, cultivating a culture of knowledge sharing, collaboration , and community along the way. Unfortunately, monetizing such projects has always been a challenge, and ensuring contributors are compensated for their contributions working on them, even more so. On the other hand, closed-source projects offer greater control, security, and competitive advant...