Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: antiRepublicrat

From what I’ve read about the subject over at XDA, if your rooted and just using an app that will allow tethering, the carrier can tell. If your running a custom ROM, that’s somehow preventing them from knowing.

Don’t ask me how that is since it’s way beyond my knowledge of it. So far, it appears they are correct.


187 posted on 06/10/2011 12:31:15 PM PDT by F1reEng1neRed
[ Post Reply | Private Reply | To 186 | View Replies ]


To: F1reEng1neRed
If your running a custom ROM, that’s somehow preventing them from knowing.

A custom ROM cannot bypass DPI. DPI analyzes everything you do over the Internet, and all it takes is to catch you doing one thing that cannot be done on an Android phone, run one piece of software that doesn't exist for Android and uses the network. DPI can run every byte of your traffic through a bank of signatures, and if bit of traffic matches up to a known non-Android signature, such as the IE9 user agent string I showed, you get flagged for possible action.

On a wider level, network devices can track general traffic patterns, and flag any that look more PC-like than phone-like. This same exact technology is used in intrusion-detection devices on networks (see if you're being probed or hacked), but it just gets repurposed.

There are ways you can hide some indications. The TTL (time to live) for data packets can be different between a phone and its tethered computer, and thus detectable. But a custom ROM can change the TTL back, masking the tethering. This might be what they're talking about with a tethering app. Still doesn't get you past DPI though.

188 posted on 06/10/2011 1:13:51 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 187 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson