This is about awareness, not just prevention. Kinda a smoke allarm.
Yes, GrapheneOS can already block many attacks (like 2G coercion), but that doesn’t mean we should remain blind to events that might signal:
rogue tower presence (IMSI catchers, forced downgrades),
profile tampering (silent config pushes),
or targeted interference (for example jamming causing phantom “connectivity”).
There are useful signals available today without HAL 3.0 or baseband hacks.
I think with current AOSP APIs, it is possible to monitor:
sudden RAT downgrades despite preferred network locks,
unexplained MCC/MNC changes without location updates,
repeated tower hops while stationary,
signal inconsistencies (e.g. sudden RSRP/RSRQ drops without motion).
These aren’t definitive proof of attack of course but neither is a phishing link. We flag anomalies, not certainties in these cases.
Testing is practical. Here's how:
In lab: SDR test rigs (srsRAN, OpenBTS) in Faraday cages to simulate base stations and replay rogue scenarios, sure.
In the field: similar to EFF's RayHunter model crowdsourced passive logs + community validation, not “proof by detection.”
This doesn’t need to be perfect to be valuable, just informative without being noisy.
What would it cost GrapheneOS?
A small, optional background service (500–800 LOC Kotlin),
No HAL/kernel dependencies,
Opt-in toggle under “Developer - Experimental” to avoid user confusion.
This would feed logs to adb for community testing long before becoming a user-facing feature.