{"id":4279,"date":"2022-01-14T19:17:09","date_gmt":"2022-01-14T13:47:09","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=4279"},"modified":"2022-01-14T19:17:11","modified_gmt":"2022-01-14T13:47:11","slug":"why-android-users-can-now-disable-2g-to-block-stingray-attacks","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/","title":{"rendered":"Why Android Users Can Now Disable 2G to block Stingray Attacks?"},"content":{"rendered":"\n<p>Google has finally rolled out an option on Android permitting users to disable 2G connections which come with a host of privacy and security problems exploited by cell-site simulators. Additionally, the option was traced by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How is it Captured by \u201cStingrays\u201d?<\/strong><\/h2>\n\n\n\n<p>A cell-site simulator, also known as \u201cStingray\u201d or IMSI catcher, is a device that disguises as a cell tower, forcing cell phones in their range to connect to it. This connection allows the operators of these Stingrays to perform man-in-the-middle attacks and arrest sensitive personal data like:<\/p>\n\n\n\n<ul><li>Device IMSI (international mobile subscriber identity)<\/li><li>Call metadata like dialed number and duration<\/li><li>SMS and voice call content<\/li><li>Data usage and web browsing history<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-image1.jpg\" alt=\"Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-image1\" class=\"wp-image-4281\" width=\"587\" height=\"447\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-image1.jpg 709w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-image1-300x228.jpg 300w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><\/figure><\/div>\n\n\n\n<p>Unluckily, this procedure of data interference has been repeatedly and instinctively set up by law enforcement authorities during peaceful protests in otherwise democratic countries where the data protection laws apply strictly.<\/p>\n\n\n\n<p>Moreover, the documented cases of private deployment of \u201cstingrays\u201d have also been generous in recent years, so the harm of communication network vulnerabilities is widespread.<\/p>\n\n\n\n<p>Most of these vulnerabilities have been addressed in 4G, but the assumed base stations have a way to downgrade nearby devices connections to 2G, importantly laying the ground for exploiting previous bugs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why <strong>Accommodating 2G on Android<\/strong>?<\/h2>\n\n\n\n<p>While Google has provided the Android users the option not to permit 2G cellular connections on their device, the setting is turned on by default. If you want to turn it off, you can go to \u2018Setting \u00e0 Network &amp; Internet \u00e0 SIMs \u00e0 Allow 2G\u2019. Relying on the device maker and the Android skin utilized, the path to access that setting may be different.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"780\" height=\"312\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingray-Attacks-image2.png\" alt=\"Why-Android-Users-Can-Now-Disable-2G-to-block-Stingray-Attacks-image2\" class=\"wp-image-4282\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingray-Attacks-image2.png 780w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingray-Attacks-image2-300x120.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingray-Attacks-image2-768x307.png 768w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/figure><\/div>\n\n\n\n<p>Note that the Setting has only been made available on Android 12 for now. Xiarch has tested Android 11 and Android 10, but the option is not yet available. We have also asked Google to clear if there are hardware needs too for this new option to work, and they told us that the modem needs to support the 1.6 Radio HAL, which is available only on the advanced devices.<\/p>\n\n\n\n<p>Also, it\u2019s important to clarify that 2G remains active as a backup for emergency calls no matter what position the toggle is set to, so there\u2019s no way to disable it completely. Eventually, Apple hasn\u2019t given iPhone users a option to lock their devices to 4G\/5G connectivity only, but now that Google has taken that step, it\u2019s likely the competition follows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has finally rolled out an option on Android permitting users to disable 2G connections which come with a host of privacy and security problems exploited by cell-site simulators. Additionally, the option was traced by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection. How is it Captured by \u201cStingrays\u201d? A [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Google has finally rolled out an option on Android permitting users to disable 2G connections which come with a host of privacy and security problems exploited by cell-site simulators. Additionally, the option was traced by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection. How is it Captured by \u201cStingrays\u201d? A [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-14T13:47:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-14T13:47:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-featurred-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Why Android Users Can Now Disable 2G to block Stingray Attacks?\",\"datePublished\":\"2022-01-14T13:47:09+00:00\",\"dateModified\":\"2022-01-14T13:47:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\",\"url\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\",\"name\":\"Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2022-01-14T13:47:09+00:00\",\"dateModified\":\"2022-01-14T13:47:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Android Users Can Now Disable 2G to block Stingray Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited","og_description":"Google has finally rolled out an option on Android permitting users to disable 2G connections which come with a host of privacy and security problems exploited by cell-site simulators. Additionally, the option was traced by EFF (Electronic Frontier Foundation), which calls the development a victory for privacy protection. How is it Captured by \u201cStingrays\u201d? A [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2022-01-14T13:47:09+00:00","article_modified_time":"2022-01-14T13:47:11+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Android-Users-Can-Now-Disable-2G-to-block-Stingra-Attacks-featurred-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Why Android Users Can Now Disable 2G to block Stingray Attacks?","datePublished":"2022-01-14T13:47:09+00:00","dateModified":"2022-01-14T13:47:11+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/","url":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/","name":"Why Android Users Can Now Disable 2G to block Stingray Attacks? - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2022-01-14T13:47:09+00:00","dateModified":"2022-01-14T13:47:11+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/why-android-users-can-now-disable-2g-to-block-stingray-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Android Users Can Now Disable 2G to block Stingray Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4279"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=4279"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4279\/revisions"}],"predecessor-version":[{"id":4286,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4279\/revisions\/4286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/4285"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=4279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=4279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=4279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}