For those in precarious situations, standard advice like “use a burner phone” or encrypted apps only goes so far. The vulnerability often lies deeper, embedded in the same cellular architecture that ...