• 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Apple searches iPhones
#11

Quote:
12 hours ago, HeartBeatOfTheBeast said:




What about using less well known services vs major ones?




Absolutely. Sticking to more independent media services / social services is absolutely a great start.




Telegram, Signal, TOX, all great services. Of course, stay away from Facebook, Google Hangouts, iMessage, etc. They are known data loggers.




I forgot my obligatory statement: service, OS, device does NOT matter when it comes to security, Y O U matter. Your decisions, care, and effort is what makes you secure.




 




- Code is not the solution to human idiocy.




 


  Reply
#12


Yep.  Laziness will kill you.  All it takes is using "Auto Login" / "Save Password?"  for all your accounts.  Putting sites in "Bookmarks" or "Favorites". .Because you're too lazy to type in site names.  No amount of secure software or apps can save you from human stupidity.  




And to reiterate:  In the very most fundamental way they function, phones track everywhere you go, everything you do, online or off.  That's how the system knows which tower to switch you to, what data you use, how to bill you.  




And the real honeypot is tracking every personal trait, preference, data point, activity, bodily quirk, biometric, finger swipe, eye movement, and monetizing it by logging it, tagging it to you and selling it.  You like swinging dog sheaths?  You can bet the data trackers know it.....   


  Reply
#13

Quote:
On 8/8/2021 at 9:17 AM, WinterGreenWolf said:




This is nothing new, and has been done for Decades.




Content scanning of supposedly encrypted cloud content like this is quite new.




That said, I'm surprised it took this long for someone to try.


  Reply
#14


Ah yes, the ever-reliable "pedo" scapegoat... the actual number of them who try to spread media or find victims online are very few, but with how the big medias act and how badly they mangle privacy in the name of protecting victims, you'd think you are bumping into 30 of those creeps every day on your way to the local market. It's like that scaremonger who inflated the number of child kidnappings to an almost unbelievable fake number, and people seemed to believe in it instead of asking themselves why they don't even know anyone who has had their child kidnapped... fake victims are created to serve an agenda that is usually summarized by "everyone i don't like is a pedo and only Big Brother can save us from crime".




Given how phone service works, wouldn't it be impossible to keep privacy unless you forfeited having a data plan? I'm not tech savvy enough to know a lot of this stuff.


  Reply
#15


Well, yes, the single-minded pursuit of pedos is the driving force behind the amazing amount of time and treasure expended by gov't agencies around the world to break messaging and device security.  That and tracking / hoping to track, terrorists.  Or so that's the handy excuse they use; in many places they are using that premise to track down dissidents. (Israeli firm NSO reportedly spent "millions" to break iMessage).  Stumbling across zoo activity as collateral damage is an unfortunate side effect.   Still you can get a room with striped sunlight and a life-long sex-offender registry following you if you get careless.




In some parts of the world you can still buy a prepaid cellphone with cash, buy a data card with cash, and all they get when they track you is a phone number.  Don't plaster that number around anywhere and avoid honeypot sites and they don't get much.




And the old adage about "keeping your head down" goes a long ways.  Keep a low profile, don't create a public spectacle; they are a lot more likely to go after the low hanging fruit.  On-line or RL.  




 




 


  Reply
#16

Honestly, this makes me want to finally design and build a privacy-centric phone. This would be possible and fairly easy with the tech we have these days.

  Reply
#17

Quote:
Just now, QuantumHusky said:




 This would be possible and fairly easy with the tech we have these days.




Not so much that a $2 trillion company can do so on a consistent basis.  It's a freakin' radio transmitter after all.   




"Anything on the internet can, and eventually will, be hacked."




Or you could just make it to make phone calls.over copper wire.      




Oh, wait--




 


  Reply
#18

I was thinking raspeberry pi 4 hardware with a modified secure linux kernal. Though copper wire may be more affordable.

  Reply
#19

Well at least that shouldn't cost $1200.

  Reply
#20

Quote:
14 hours ago, heavyhorse said:




Well at least that shouldn't cost $1200.




Linux is free




The Raspberry Pi 4 is 35$ https://www.pishop.us/product/raspberry-...aspberrypi




The touchscreen is another 35$ https://www.adafruit.com/product/1601




SD Card 8.35$ https://www.amazon.com/SanDisk-microSDHC...377&sr=8-3




Battery 9.95 - https://www.adafruit.com/product/258




DC-DC converter step up to give us 5V for the Raspberry Pi $9.95 - https://www.adafruit.com/product/1903




GSM Breakout for calling $44.95 https://www.adafruit.com/product/1963




For an antenna $4.95 https://www.adafruit.com/product/1859




There are many configurations however this will get you a working cell phone for 148.15 and not $1200.


  Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)