23Sha-ger
I agree with you in some aspects, but
In a funny way they introducted it in late 2025, where many developed countries already phased out any obsolete generations
I don't know where the OP (or anyone else seeking advice here) is from, but unfortunately not all countries in the world are developed countries + completed the 2G/3G phase-out. Disabling these technologies may therefore not work for everyone, but a notification that your device suddenly switched to 2G in an area, where it normally wouldn't, could still be helpful.
So if you block 2G/3G with weak ciphers, it doesn't really matter if a stingray exists or not, the attacker can't force you to use weak ciphers.
Eavesdropping is one, but not the only feature of IMSI catchers:
Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. They quite literally “catch” (i.e. record) IMSIs by pretending to be real base stations and then release the target phones
source: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
For recording nearby IMSIs devices apparently don’t have to be downgraded to 2G/3G (so blocking 2G/3G doesn't help in that case):
In conclusion, our experiments have verified, independently of other works, that IMSI-catching indeed can be done for the 4G/LTE system too. We claim that (1) IMSIs can be collected by the eNodeB Collector, and (2) DoS (Denial-of-Service) is performed automatically after the UE receives an attach rejection message (with a specific cause). The 4G/LTE is vulnerable to active privacy attacks by IMSI Catcher, and we found that these attacks can be done quite easily and therefore can impact the confidence and reliability of commercial mobile networks. We showed that these attacks are not limited to clever programmers with special hardware. We hope that this report, and others, will make the 4G/LTE service providers aware of this threat, and lead to demands for improved privacy and security protocols in the mobile networks.
Source: https://arxiv.org/pdf/1702.04434
The mere recording of IMSIs and thus proof of presence maybe part of someone's threat model.
If someone cannot or does not want to use other tools such as EFF's Rayhunter, upgrading to a Pixel 10 might therefore make sense.