{"id":29156,"date":"2019-11-08T10:56:41","date_gmt":"2019-11-08T15:56:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=29156"},"modified":"2019-11-15T06:21:42","modified_gmt":"2019-11-15T11:21:42","slug":"terminator-dark-fate-chips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/terminator-dark-fate-chips\/29156\/","title":{"rendered":"Terminator 6\/3: Sarah Connor and a bag of chips"},"content":{"rendered":"<p>By the time this post goes online, <em>Terminator: Dark Fate<\/em> will have hit movie theaters worldwide. The creators of the film decided against giving it a version number, but it is the sixth movie in the franchise and completely discards the plots of the last three, so we\u2019ll call it <em>Terminator 6\/3<\/em>. In terms of practical information security, it contains only one real moment of interest: when the understandably paranoid Sarah Connor attempts to evade cell-phone tracking.<\/p>\n<p>The thing is that Sarah, who has problems with the authorities in several (more precisely, all 50) U.S. states, carries her phone in an empty bag of potato chips. Her rationale for doing so is that the foil supposedly blocks the phone\u2019s GPS signal. Does it really? We decided to test this method.<\/p>\n<h2>How cell-phone tracking actually works<\/h2>\n<p>We\u2019ll discuss the results of our potato chip bag experiment a bit further down, but first let\u2019s figure out the principles of how cell-phone tracking works. For sufferers of acute paranoia, the first thing to note is that the simpler your device, the sounder you will sleep. Sarah Connor\u2019s best bet would have been to use an old phone with no GPS or Wi-Fi at all (and ideally even without packet data transfer, aka GPRS).<\/p>\n<p>Modern smartphones determine their location by several means: GPS satellite signals, the nearest cell towers, and Wi-Fi access points. The more technologies at play, the more accurate the coordinates.<\/p>\n<p>GPS per se is nothing to fear \u2014 it allows <em>the phone<\/em> to receive signals to determine where it is, but it doesn\u2019t transmit anything. Cell towers can also get a fix on a phone\u2019s location, but not with great accuracy. Specific GPS coordinates can be transmitted to the outside world either by the device\u2019s operating system or by various applications, but for that, Internet access is required. So basically, to hide from tracking, it\u2019s not so much GPS that needs jamming, rather the cellular network and Wi-Fi.<\/p>\n<p>Returning to the bag of chips, it cannot be said that Sarah Connor invented the wheel, more like reinvented it. The trick is based on the Faraday cage principle, which was first demonstrated 183 years ago. In theory, it should screen all wireless signals: Wi-Fi, GPS, and cellular alike.<\/p>\n<p>Incidentally, even the use of a bag of chips as a Faraday cage is nothing new: More than 20 years ago, Gene Hackman\u2019s character in <em>Enemy of the State<\/em> pulled off the technique. But communication technologies are forever improving, and aluminum is getting more expensive, who knows if modern bags can effectively shield the radio signals of today\u2019s standards. That\u2019s why we decided to put Sarah Connor\u2019s method to the test.<\/p>\n<h2>Experiment: Does a potato chip bag protect against tracking?<\/h2>\n<p>As the test tool, we used the <a href=\"https:\/\/www.kaspersky.com\/safe-kids?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksk___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Safe Kids<\/a>\u00a0application. This app can provide a child\u2019s precise location, and determine whether the cellular network, GPS, and Wi-Fi are up and running on a phone.<\/p>\n<p>We installed the application on the test device in child mode, enabled Internet access on it via 4G, and went for a walk around the office. Beforehand, we bought (and ate) several bags of chips, as well as a couple of tin boxes of cookies of different shapes. We then tried to use the packages to block the signal.<\/p>\n<p>First piece of advice, don\u2019t bother with cookie tins. It\u2019s too hard to predict which will be effective: Some reliably jammed any signal, but others shook off GPS satellites only, and only indoors, where the signal is weak anyway.<\/p>\n<p>Potato chip bags were more promising \u2014 although not from the start. First, we stuffed the device into one bag and confirmed it had no effect at all. The coordinates were determined to an accuracy of just a couple of meters. So, initially, we were worried about Sarah\u2019s safety. But then we had the idea of making multilayered protection out of two chip bags. It turned out that the double-shielding did indeed prevent the phone from receiving and transmitting signals!<\/p>\n<p>To be sure, we tested several bags made by different producers. The result was the same: Two bags work, one bag doesn\u2019t. Perhaps Sarah\u2019s chip bag was made by a company with foil to spare, so that one layer was in fact all she needed. But if you\u2019re a paranoid realist, we recommend using at least two bags \u2014 or even three.<\/p>\n<blockquote><p>The experiment results: Tin boxes are unreliable. Two bags work, one bag doesn\u2019t.<\/p><\/blockquote>\n<p>Keep in mind that if you want to make a call, however quick, you\u2019ll have to remove the phone from its chip-bag armor, which will give it time to transmit its GPS coordinates to the network and at the very least will have its approximate location triangulated by cell towers. As Carl (the drapery shop owner) suggests in the movie, If you\u2019re gonna keep your phone in a bag of chips, then <em>keep<\/em> your phone in a bag of chips.<\/p>\n<h2>Terminator 6\/3: Besides chips<\/h2>\n<p>Aside from bags of chips, the new <em>Terminator<\/em> has nothing to say about cybersecurity. Sure, cyborgs break into a police database, a border guard computer system, and a cellular company\u2019s network. But from a practical perspective, these hacks are of no interest \u2014 they do not occur as a result of specified system design flaws, but simply because the cyborgs use undetermined futuristic methods to defeat modern technology: in a word, technomagic.<\/p>\n<p>Read our cyberdissection of the previous two movies in the series (in the new version of the timeline) in our post called \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/terminator-1-2-cybersecurity\/29080\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The cybersecurity of the Terminator<\/a>\u201c.<br>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"safe-kids\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?<\/p>\n","protected":false},"author":700,"featured_media":29162,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788],"tags":[385,1130,43,1262,812,3152],"class_list":{"0":"post-29156","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"tag-gps","10":"tag-movies","11":"tag-privacy","12":"tag-terminator","13":"tag-tracking","14":"tag-truth"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/terminator-dark-fate-chips\/29156\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/terminator-dark-fate-chips\/16870\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/terminator-dark-fate-chips\/14247\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/terminator-dark-fate-chips\/18843\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/terminator-dark-fate-chips\/16889\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/terminator-dark-fate-chips\/15657\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/terminator-dark-fate-chips\/19581\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/terminator-dark-fate-chips\/18217\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/terminator-dark-fate-chips\/23954\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/terminator-dark-fate-chips\/6629\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/terminator-dark-fate-chips\/12502\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/terminator-dark-fate-chips\/12520\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/terminator-dark-fate-chips\/11411\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/terminator-dark-fate-chips\/20474\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/terminator-dark-fate-chips\/24440\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/terminator-dark-fate-chips\/24359\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/terminator-dark-fate-chips\/19329\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/terminator-dark-fate-chips\/23625\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/terminator-dark-fate-chips\/23473\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/truth\/","name":"truth"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/29156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=29156"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/29156\/revisions"}],"predecessor-version":[{"id":29325,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/29156\/revisions\/29325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/29162"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=29156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=29156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=29156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}