CommsBlack Mobile

Module 03 — Connection Security


🌐 1. Network Threats at a Glance

Every time your device talks to the internet, it passes through multiple parties: local Wi-Fi, ISP/telco, backbone providers, the destination service, and sometimes monitoring or logging systems in between.

Connection security is about deciding who you are willing to trust with which pieces of information.

🕳️ 2. VPN: Encrypted Tunnel with a Trade-Off

Capabilities

  • Encrypts traffic between your device and the VPN provider.
  • Hides browsing content from local Wi-Fi and your ISP.
  • Lets you appear to be in a different region.

Limitations

  • The VPN provider can see your exit traffic and IP.
  • Does not hide activity from the sites you log into.
  • Does not automatically provide anonymity.

Good use-cases

  • Shield device on untrusted hotel or café Wi-Fi.
  • Reducing basic profiling by local network operators.

🧅 3. Tor: Anonymity-Focused Routing

Capabilities

  • Multi-hop route through Tor relays, separating source from destination.
  • Designed to resist simple IP-based tracking.

Limitations

  • Slower and sometimes blocked by websites or services.
  • Behaviour (logins, patterns, unique browser traits) can still reveal identity.

Good use-cases

  • Shadow/Ghost workflows needing stronger IP separation.
  • High-risk research where identity link is a primary concern.

📡 4. Telcos, SIMs & Location

  • Mobile networks log which towers a device connects to over time.
  • SIM registration data can tie activity to an individual or entity.
  • Anonymous or minimally linked SIMs reduce direct identity linkage but not radio-level location information.

📶 5. NW750 & Faraday Use

  • Privacy routers centralise hardened DNS and outbound rules.
  • Faraday bags physically isolate devices during transit or storage — useful for border crossings and sensitive meetings.
  • A Faraday bag is most effective when combined with good device lock and power-down practices.

🧬 6. Fingerprinting & Correlation

A “fingerprint” is a combination of traits: device model, language, time zone, fonts, browser quirks and more. Over time, repeated patterns can link different sessions together.

  • Avoid mixing high-risk and personal logins on the same connection.
  • Keep Shadow and Ghost behaviours simple and consistent to avoid creating unique patterns.