chinook Just seen this linked on the hackernews: https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/ O2 VoLTE: locating any customer with a phone call Nothing in the article suggests it has been resolved. The conversation suggests there are also non-root options available for the people curious about the data sent by the network.
Wadder chinook Bleeping Computer have reported this issue as fixed now, thankfully, as I had family members you use the network. https://www.bleepingcomputer.com/news/security/o2-uk-patches-bug-leaking-mobile-user-location-from-call-metadata/
Onlyfun chinook good to know thank you! Wondering now if such vulnerabilities are addressed by graphene os? If a graphene os device is being attacked? Also is a non-cellular setup(airplane mode, on wifi) vulnerable to anything similar?
chinook Onlyfun I don't think you can defend from this -- this vulnerability is described as leak on the network level (ie not from your phone). Non-cellular mode should be good enough (it will only be leaking the last known position). But it seems it has been patched now.