Don't use Mobile Phones

I used LineageOS without Gapps for two years. The thing that made me go back to normal Android was that I ran into the some apps not working correctly without Google framework. The opensource framework that comes with LineageOS without gapps doesn't work correctly with all apps making some apps not fully functional, the same problem will be with GrapheneOS since I've heard it's even more private than LineageOS.
Graphene has actually made significant advances in dealing with some of these issues
compared to Lineage and Calyx

But yes , there will always be a few apps that just won't work .
It's up to individual users to choose which compromises are acceptable .

On a side note -
MicroG tricks Google into thinking that it is interacting with a standard Android phone .
 
Last edited:


...or maybe we "need" portable phones which are no longer « smart », e.g. just required to prove useful as phones...

Ironically those devices already exist an they're even called "feature phones", although it actually translates into a basic set of functions labelled as a "light" phone.
 
...or maybe we "need" portable phones which are no longer « smart », e.g. just required to prove useful as phones...

Ironically those devices already exist an they're even called "feature phones", although it actually translates into a basic set of functions labelled as a "light" phone.
I don't think they let in the market any kind of phone that is not rigged, even dumb phones spy on you, you just don't have the functionality of a smart phone and you pay less
 
@Terminal Velocity
@GatorsFan
Yes even landline phones are subject to monitoring but one big difference is that only your government will be able to do so, while with mobile phones anyone can get in, foreign governments as well as hackers.
 
Yeah sure I agree they are tracking devices but in this day an age it's not possible to live without one anymore because without one your making life 200% more complicated and difficult for yourself.
Have one but only use 2FA on sites that already have your info, like bank etc.. Then maybe keep it wrapped in tinfoil when not in use...?

I think we are all really screwing future generations by just going along with being data products/slaves...
 
PinePhone with PostmarketOS: A Security and Privacy Review



Rating: 9.5/10



The PinePhone, running PostmarketOS, stands out as a beacon of security and privacy in the mobile device landscape. By implementing a comprehensive suite of security and privacy measures, this combination offers a robust platform for users who prioritize their digital autonomy. Here’s a detailed review focusing solely on its security and privacy functionality:



1. Full Disk Encryption (10/10)

Full disk encryption using LUKS ensures that all data stored on the PinePhone is protected. This measure is critical for safeguarding sensitive information from unauthorized access. The use of a strong passphrase and regular testing of the encryption setup further bolster this security feature. This level of encryption is essential for protecting data at rest, making it a cornerstone of the PinePhone’s security posture.



2. Secure Boot (9.5/10)

Enabling secure boot on the PinePhone ensures that only trusted software can run on the device. This feature mitigates the risk of malicious software being executed during the boot process. Regular updates to secure boot keys and thorough configuration testing enhance its effectiveness. While there is always room for improvement in key management, the implementation here is solid and effective.



3. App Sandboxing (9/10)

Using sandboxing mechanisms like bubblewrap or firejail to isolate applications from each other and from the system is a commendable approach. This practice reduces the risk of malware spreading and ensures that applications operate within their designated boundaries. Regular review and updating of sandboxing configurations are essential for maintaining this security level. While there may be occasional compatibility issues, the overall implementation is robust.



4. Firewall (9.5/10)

Implementing a firewall using tools like ufw or iptables allows for precise control over network access. By defining strict rules and regularly reviewing them, users can block unnecessary connections and protect their device from network-based attacks. Monitoring network traffic for suspicious activity adds an additional layer of security. The firewall’s effectiveness in controlling inbound and outbound traffic is commendable.



5. Regular Updates (10/10)

Keeping the OS and applications up to date is critical for addressing security vulnerabilities. Enabling automatic updates for critical system components and regularly reviewing and installing updates for all applications ensures that the PinePhone remains secure against emerging threats. This proactive approach to patching is a significant strength of the PinePhone’s security model.



6. No Telemetry (10/10)

Disabling or removing telemetry features that collect data about usage is a significant privacy enhancement. By reviewing and disabling telemetry in system settings and removing any applications that include telemetry features, users can maintain control over their data. Regular audits for new telemetry features ensure ongoing privacy protection. This complete elimination of telemetry is a standout feature for privacy-conscious users.



7. No Cloud Services (9.5/10)

Avoiding cloud services and opting for local storage or self-hosted solutions reduces the risk of data leakage. Using local storage for all data and applications and considering self-hosting necessary services on a secure, private server are excellent practices. Regular updates to self-hosted services ensure they remain secure. While some users might miss cloud integration, the focus on local and self-hosted solutions is a strong privacy feature.



8. Tor Integration (9.5/10)

Integrating the Tor network for anonymous browsing and communication is a powerful privacy feature. Configuring the system to route all network traffic through Tor and regularly updating the Tor software ensures a high level of anonymity. Monitoring Tor usage for suspicious activity adds another layer of security. The seamless integration of Tor enhances the PinePhone’s privacy capabilities.



Additional Security Considerations

- Physical Security: Ensuring the device is physically secure through strong passphrases and disk encryption is crucial. The PinePhone’s hardware design, including the ability to physically disable components like the camera and microphone, adds to its physical security.

- Backup: Regularly backing up important data to a secure, offline location is essential for data recovery. This practice ensures that even in the event of a security breach, critical data remains protected.

- Monitoring: Using monitoring tools to detect and respond to security incidents enhances overall security. The PinePhone’s open-source nature allows for the integration of various monitoring tools, providing a comprehensive security posture.

- Community Support: Engaging with the PinePhone and PostmarketOS communities provides valuable support, updates, and security best practices. The active community ensures that users have access to the latest security information and patches.
 
Everybody take a deep breath. And enjoy your smartphone until it is replaced by the next whatever that will be condemned for (A... B... or C...)

Back in the early 60s, when cable was just beginning to arrive, it got the same reaction. Ads, letters to the editor, even shorts before the main movie at the theater, exclaimed that with this electronic intrusion into a private home, companies would be able to watch your young daughter change clothes and you, God forbid, drinking beer despite being a church layman.

When video cameras began appearing in droves at checkouts and even entrances, big brother would be able to catalog your life from beginning to end. (Droves in those days, meaning probably two dozen in total in the city.)

Then there was the ruckus when schools started using SS numbers for student IDs. Just the start of the national ID and the requirements for the demand, "Your papers!" Freedom is about to be lost. (In retrospect, that probably was a bad idea for a different reason.)

A phone for myself is not a social instrument. Only for a very few calls, some messages, convenience when out and about and safety if a blowout happens on a remote road away from help. GPS is good on occasion, also. As to worry about tracking, I resist all commercial attempts with blockers where available, carefulness about where my email is used, etc. As to being tracked by big bro... Well, if some agent is spending his/her time in watching my daily activities, that is going to be one bored sob.

And I expect that applies to every last person on this blog.
 
Everybody take a deep breath. And enjoy your smartphone until it is replaced by the next whatever that will be condemned for (A... B... or C...)

Back in the early 60s, when cable was just beginning to arrive, it got the same reaction. Ads, letters to the editor, even shorts before the main movie at the theater, exclaimed that with this electronic intrusion into a private home, companies would be able to watch your young daughter change clothes and you, God forbid, drinking beer despite being a church layman.

When video cameras began appearing in droves at checkouts and even entrances, big brother would be able to catalog your life from beginning to end. (Droves in those days, meaning probably two dozen in total in the city.)

Then there was the ruckus when schools started using SS numbers for student IDs. Just the start of the national ID and the requirements for the demand, "Your papers!" Freedom is about to be lost. (In retrospect, that probably was a bad idea for a different reason.)

A phone for myself is not a social instrument. Only for a very few calls, some messages, convenience when out and about and safety if a blowout happens on a remote road away from help. GPS is good on occasion, also. As to worry about tracking, I resist all commercial attempts with blockers where available, carefulness about where my email is used, etc. As to being tracked by big bro... Well, if some agent is spending his/her time in watching my daily activities, that is going to be one bored sob.

And I expect that applies to every last person on this blog.
I like your philosophy on taking it easy and not getting emotional, but these days it's just an algorithm that tracks your every online move. AI has already been used in the Middle East to target insurgents for bomb strikes, so if that ever comes to an area near us then just hope we're not looking at the same websites the terrorists are...
 
PinePhone with PostmarketOS: A Security and Privacy Review



Rating: 9.5/10



The PinePhone, running PostmarketOS, stands out as a beacon of security and privacy in the mobile device landscape. By implementing a comprehensive suite of security and privacy measures, this combination offers a robust platform for users who prioritize their digital autonomy. Here’s a detailed review focusing solely on its security and privacy functionality:



1. Full Disk Encryption (10/10)

Full disk encryption using LUKS ensures that all data stored on the PinePhone is protected. This measure is critical for safeguarding sensitive information from unauthorized access. The use of a strong passphrase and regular testing of the encryption setup further bolster this security feature. This level of encryption is essential for protecting data at rest, making it a cornerstone of the PinePhone’s security posture.



2. Secure Boot (9.5/10)

Enabling secure boot on the PinePhone ensures that only trusted software can run on the device. This feature mitigates the risk of malicious software being executed during the boot process. Regular updates to secure boot keys and thorough configuration testing enhance its effectiveness. While there is always room for improvement in key management, the implementation here is solid and effective.



3. App Sandboxing (9/10)

Using sandboxing mechanisms like bubblewrap or firejail to isolate applications from each other and from the system is a commendable approach. This practice reduces the risk of malware spreading and ensures that applications operate within their designated boundaries. Regular review and updating of sandboxing configurations are essential for maintaining this security level. While there may be occasional compatibility issues, the overall implementation is robust.



4. Firewall (9.5/10)

Implementing a firewall using tools like ufw or iptables allows for precise control over network access. By defining strict rules and regularly reviewing them, users can block unnecessary connections and protect their device from network-based attacks. Monitoring network traffic for suspicious activity adds an additional layer of security. The firewall’s effectiveness in controlling inbound and outbound traffic is commendable.



5. Regular Updates (10/10)

Keeping the OS and applications up to date is critical for addressing security vulnerabilities. Enabling automatic updates for critical system components and regularly reviewing and installing updates for all applications ensures that the PinePhone remains secure against emerging threats. This proactive approach to patching is a significant strength of the PinePhone’s security model.



6. No Telemetry (10/10)

Disabling or removing telemetry features that collect data about usage is a significant privacy enhancement. By reviewing and disabling telemetry in system settings and removing any applications that include telemetry features, users can maintain control over their data. Regular audits for new telemetry features ensure ongoing privacy protection. This complete elimination of telemetry is a standout feature for privacy-conscious users.



7. No Cloud Services (9.5/10)

Avoiding cloud services and opting for local storage or self-hosted solutions reduces the risk of data leakage. Using local storage for all data and applications and considering self-hosting necessary services on a secure, private server are excellent practices. Regular updates to self-hosted services ensure they remain secure. While some users might miss cloud integration, the focus on local and self-hosted solutions is a strong privacy feature.



8. Tor Integration (9.5/10)

Integrating the Tor network for anonymous browsing and communication is a powerful privacy feature. Configuring the system to route all network traffic through Tor and regularly updating the Tor software ensures a high level of anonymity. Monitoring Tor usage for suspicious activity adds another layer of security. The seamless integration of Tor enhances the PinePhone’s privacy capabilities.



Additional Security Considerations

- Physical Security: Ensuring the device is physically secure through strong passphrases and disk encryption is crucial. The PinePhone’s hardware design, including the ability to physically disable components like the camera and microphone, adds to its physical security.

- Backup: Regularly backing up important data to a secure, offline location is essential for data recovery. This practice ensures that even in the event of a security breach, critical data remains protected.

- Monitoring: Using monitoring tools to detect and respond to security incidents enhances overall security. The PinePhone’s open-source nature allows for the integration of various monitoring tools, providing a comprehensive security posture.

- Community Support: Engaging with the PinePhone and PostmarketOS communities provides valuable support, updates, and security best practices. The active community ensures that users have access to the latest security information and patches.

I don't think they will ever be able to compete with Android or Apple iphone.
 
Must read and must watch stuff:


If your worried about your phone tracking you can just get a faraday bag for it. You will be limited to listening to messagess and making out going calls but it will limit tracking. For me I can't think of a phone call that I would not be ok with being broadcast over a PA system. The constant tracking is a bit more problematic but I guess you take the measures you fell necessary to maintain the desired level of privacy.. As far as banking on your phone I rarely do that unless I really have to. I use the same security measures I would as using online banking from home. Highly recommend you use two factor authentication for everything. Online services are not the problem. Its people security hygiene.....
 
They even come in red/pink

1727072307997.png

1727072890087.png
 
Last edited:
One of those would fit in my travel bag which I take when travelling by air
 
I miss the good old days when I could drop my phone down 3 flights of stairs, pick up the pieces, reassemble, and carry on like nothing happened.
I miss a lot of stuff from old days, today even bags from market are so low quality you have pick up oranges on the street as soon as you leave the market lol
 

Staff online

Members online


Top