Don't use Mobile Phones

Apple or Google
Lol, if you do something online, google knows about it! The jig is up. I am not joking.

I was watching this not so great hacker show called "person of interest" recently. The premise is preposterous (a government machine that predicts violent crimes by spying on everyone all the time), but the NSA has been collecting [almost] all internet traffic for a while now. Why else would they have yottabytes of data?
 


We need to have Linux system for Mobile phones too with custom compilation option with minimum possible requiremenets

Why ?

Servers are meant to be constantly available ...

Cellphones are not, not even close. What "service" are you going to run ?
 
I agree in not using phones, but survival in today's world makes that incredibly tough. I do make sure I hide as much as I can tho.

I have also been getting into writing android software. and I have indeed confirmed that google has made the absolute worst version of linux to ever exist.

I can't control or shut down other apps.
I can't shut down the device.
I can't access root.
I can't delete my user data.

and that is just after 3 weeks of programming I am finding that the linux version called android is centered around profit and takes all control away from the user. It is not even your device, it belongs to google because only they can do things to your device. My DDG setup is blocking hundreds of google data collection attempts every day. Devs like to use google analytics to monitor their programs and find issues, but in the background without even the dev knowing, google is collecting data en-mass. Or at least they used to before I had DDG block it all.

maybe if we could put a real linux on the devices it would be a better world.
 
If your worried about your phone tracking you can just get a faraday bag for it. You will be limited to listening to messagess and making out going calls but it will limit tracking. For me I can't think of a phone call that I would not be ok with being broadcast over a PA system. The constant tracking is a bit more problematic but I guess you take the measures you fell necessary to maintain the desired level of privacy.. As far as banking on your phone I rarely do that unless I really have to. I use the same security measures I would as using online banking from home. Highly recommend you use two factor authentication for everything. Online services are not the problem. Its people security hygiene.....
A good idea in certain circumstances, but remember what a modern phone does (or at least, used to) when it can't see a tower. It cranks up the power and tries again. Then up some more and so on. I put my phone in one of those super magnesium briefcases once (iPhone 8, or maybe XS) and when I got to my destination, it was not only out of battery but fricking HOT. Put it in airplane mode before blocking the signal.

I haven't bothered to research, but it is possible that newer phones have this problem fixed. When I drive way out in the sticks and away from cell service, my iPhone 15 will get warm for a short while, but then cools down. Possibly they are now programmed to finally give up and try later. Or just attempt a ping every now and then.
 
If your worried about your phone tracking you can just get a faraday bag for it. You will be limited to listening to messagess and making out going calls but it will limit tracking. For me I can't think of a phone call that I would not be ok with being broadcast over a PA system. The constant tracking is a bit more problematic but I guess you take the measures you fell necessary to maintain the desired level of privacy.. As far as banking on your phone I rarely do that unless I really have to. I use the same security measures I would as using online banking from home. Highly recommend you use two factor authentication for everything. Online services are not the problem. Its people security hygiene.....
2 factor authentication is a joke. It relies on you having your phone around and that is not always possible. Not to mention it relies on google accounts not being hacked. Which we all know never happens. 2FA is problematic for most people and is something that will actually make things less secure.

this is a copy of an article, sorry I was unable to do the url on it as it requires sign in to view.

The Illusion of Security: Why Two-Factor Authentication Falls Short in Ensuring Privacy
Introduction:
In the digital age, privacy concerns have become increasingly prominent. With hackers constantly devising new ways to infiltrate personal information, users are urged to adopt security measures for their online accounts. One such widely recommended practice is two-factor authentication (2FA), which adds an extra layer of security on top of traditional passwords. However, despite its widespread use, 2FA is not as secure as it appears. In this article, we will explore why two-factor authentication is not foolproof in safeguarding our online privacy.
1. The Weakness of Mobile Devices:
While 2FA primarily relies on using mobile devices to generate unique codes, these devices themselves can be vulnerable. Malware and other forms of attacks can compromise the security of mobile phones, giving hackers access to the 2FA codes and undermining the entire process. Moreover, if a user's mobile device is lost or stolen, the attacker may easily bypass 2FA by gaining control over the device.
2. SMS Vulnerabilities:
One common method of 2FA involves receiving codes through SMS messages. However, these messages can also be intercepted or exploited through SIM swapping, where a hacker convinces a mobile carrier to redirect messages to a SIM card under their control. By obtaining the 2FA codes, attackers can easily bypass this security measure. Furthermore, SMS can be intercepted and read by malware or rogue applications installed on a user's device.
3. Phishing Attacks and Social Engineering:
While 2FA adds an extra layer of security, it can still be circumvented by clever phishing techniques or social engineering. Hackers use sophisticated methods to deceive users into revealing their credentials or providing the second factor, rendering the whole purpose of 2FA futile. By impersonating trusted entities, attackers can trick users into disclosing sensitive information or granting access to their accounts.
4. Authentication Apps at Risk:
Authentication apps, such as Google Authenticator or Authy, offer an alternative to SMS-based 2FA. However, these apps are not immune to risks. If a user's device is compromised or infected with malware, attackers can access the authentication app and extract the necessary codes. Additionally, users who don't sufficiently protect their devices or back up their app data may lose access to their codes, locking themselves out of their accounts.
5. Inconvenience Breeds Compromise:
One aspect often overlooked is how inconveniences associated with 2FA may lead users to compromise their security. Frustration can push individuals to disable 2FA, use easily guessable codes, or even write down sensitive information in insecure locations. The inconvenience of constantly entering additional codes may result in users opting for less secure practices in the name of convenience.
Conclusion:
While two-factor authentication is commonly touted as a robust security measure, it is not foolproof in protecting online privacy. Mobile device vulnerabilities, SMS exploits, phishing attacks, social engineering, and even user inconvenience create ample opportunities for hackers to bypass this security layer. It is important for users and service providers to remain aware of these limitations and explore additional security measures to strengthen online privacy. Ultimately, maintaining a proactive approach to personal cybersecurity is crucial in an ever-evolving digital landscape.
 
I agree in not using phones, but survival in today's world makes that incredibly tough. I do make sure I hide as much as I can tho.

I have also been getting into writing android software. and I have indeed confirmed that google has made the absolute worst version of linux to ever exist.

I can't control or shut down other apps.
I can't shut down the device.
I can't access root.
I can't delete my user data.

and that is just after 3 weeks of programming I am finding that the linux version called android is centered around profit and takes all control away from the user. It is not even your device, it belongs to google because only they can do things to your device. My DDG setup is blocking hundreds of google data collection attempts every day. Devs like to use google analytics to monitor their programs and find issues, but in the background without even the dev knowing, google is collecting data en-mass. Or at least they used to before I had DDG block it all.

maybe if we could put a real linux on the devices it would be a better world.


Face it, Smartphones are extreme budget PC's, what do you expect ?

Pay peanuts, get monkeys.
 
Face it, Smartphones are extreme budget PC's, what do you expect ?

Pay peanuts, get monkeys.
you made me laugh. Thank you. You summed it up so well in so few words.

I think it is true that if you want to know about something, talk to people that work under the hood and see the engine.
 
When it comes to software, I think it's not that difficult to evaluate what's under the hood, by just looking at the resulting software.
Maybe I'm not your average software user, but when I look at software running, I can see what the programmer was thinking.
For example, if I think the quality is low, I KNOW what kind of bugs they are going to make. Certain code only gets written for the last 10% of achieving the impossible target of code perfection.
Typically that is : error handling, but also just not handling unusual inputs at all, or assuming everybody enters a 10 digit answer, make the viewable input 15 characters and you want to enter 40 characters, and know it's even that exceptual. Stuff like that.
 
When it comes to software, I think it's not that difficult to evaluate what's under the hood, by just looking at the resulting software.
Maybe I'm not your average software user, but when I look at software running, I can see what the programmer was thinking.
For example, if I think the quality is low, I KNOW what kind of bugs they are going to make. Certain code only gets written for the last 10% of achieving the impossible target of code perfection.
Typically that is : error handling, but also just not handling unusual inputs at all, or assuming everybody enters a 10 digit answer, make the viewable input 15 characters and you want to enter 40 characters, and know it's even that exceptual. Stuff like that.
I think most of that is the result of programmers not being taught about fault tolerance or other things that are in my opinion essential. I am on an android developer forum just like this linux forum. The people and attitudes are so different.

here people look to help others and conflict is at a minimum.
over there they all want money and donations for the help. conflict is high and answers few.

The difference seems that linux people are more concerned with quality and help. Over there they are all windoze people and I think we all know that mentality. Quality and efficiency are unheard of. It saddens me.

I am a 30 year firefighter / medic and we are used to working for nothing, sometimes literally, and the main thing is helping. I am not used to acting Ferengi.
 
Yeah, it's all nice but in the end kapitalism works this way, otherwise we would live in a communist country, where everything is cheap, but also crap. What good software is invented in communist countries ? Nothing. Except Tetris.
 
Prism, Pegasus.. why now? If this is such an old story.
It is possible to fight Google (just use custom ROM) but I doubt that average joe can fight TLAs efficiently though I am not affraid of massive data collection by spy agencies simply because they are not capable to process all collected information. Also, I doubt that any TLA will bother installing anything on my phone and if this happens (by some mistake) they will not find anything interesting on my phone.
I doubt that turning off smartphone is efficient at all. One has to remove battery to turn smartphone off so if it is on or "off" does not matter much.
De-googling phone is easy though (in contrast to Apple phones where getting rid of Apple is not possible with the newest hardware).
Also keeping system clean from malware is not so difficult.
 
Just another idea: use different phones. What they try to do is collect as much different data belonging to the same person ... that's harder to do if you split up activity. Different eco-system is even better ... shame there's only two.
Well, two major ones. If there are others : use these.
 

Members online


Latest posts

Top