Control the phone by installing Android Scripting Layer on it and exposing the API control port. Simples.

On 15 October 2014 06:55:27 GMT+01:00, coderman <coderman@gmail.com> wrote:
On 10/14/14, bluelotus@openmailbox.org <bluelotus@openmailbox.org> wrote:
How would tethering a tablet or laptop to a smartphone be more private
than directly using the smartphone?


it is more private because you are separating domains of
communication. the less trustworthy smartphone is used as a network
link (cell or other uplink) and not trusted with the content of the
encrypted communications it carries.

likewise, the cryptographic sessions live off device, on the tethered
tablet or laptop, where presumably it is beyond reach of a suspect
smartphone.

there are many attack methods which can escalate beyond the vulnerable
device, however, so this approach must be considered in the context of
threat model, and likely insufficient alone.



Do tablets have a secret baseband?

yes, however they are fewer, and if limited to 802.11, easier to
isolate / verify with external tools.



How to drive a phone's sms over it's usb port?

"instrumenting and automating" device behavior through remote or
programmatic means is a black art unto itself. :P


best regards,

--
Sent from my Android device with K-9 Mail. Please excuse my brevity.