FireFox (new terms of services) - avoid using it!

Do think the real target after the iPhone came along are the smartphones, you can't really tamper with them. With a computer, for instance, you could just use layers of extensions and tweaks on the browser, but even then.

We might be very well be using the indestructible Nokia 3310, but'll be revealing your location to cell towers, and your calls to the phone companies, of course. Guess these thingies should be set aside away in a far way room if you are discussing important things.

View attachment 106507
(and) Preferably inside a faraday bag/cage.
 
25 years ago, the company I worked for made internet backbone switches. By law they had a backdoor for intel agencies to access any individual stream (voice, data, video, whatever).
A few years ago I was implementing a software GPRS tunneling proof of concept for T-Mobile. Even in the proof of concept, there was a requirement to be able to redirect the GPRS tunnel outside of T-Mobile's infrastructure, for lawful interception needs.

Guess these thingies should be set aside away in a far way room if you are discussing important things.
It is essential to not have windows in the room, as their vibrations can be monitored. Similarly, even if you desolder a smartphone's microphone, the accelerometer can be used to reconstruct voice.

By the way, if a smartphone is off in the sense that a switch off button was pressed, it does not necessarily mean that it still does not transmit or receive some data.
Although airplane mode should deactivate the modem permanently, and this was even verified by the GrapheneOS team, so at least Google Pixels should not connect to the carrier. Even without a SIM card, the cellular modem still connects to carriers. Additionally, there are low-power hardware modules on the phone that continue to function even when the main processor is sleeping. A good example of this is the module that waits for voice commands, such as "hey Siri", and wakes up the main processor.

Brave has Tor embed if I remember correctly.
With browser fingerprinting, the more niche the hardware and software configuration you use, the more prone to fingerprinting you are. So, Brave with Tor feels like a honeypot to me. I was impressed at how I stood out with my "secure and private" combination of Vanadium browser on GrapheneOS compared to my wife's standard Windows desktop with Chrome. My fingerprint was way way more unique than hers, so I was more trackable between websites.
 
Nope. Neither of us use any shopping apps, so the only thing I can think of is:
1. Ads / ad data sharing (even between Amazon/Google and AliExpress)
2. The sharing of data goes WAAAAY beyond what just Google does, or what advertisers do, etc.
it amazes me that most people even when using apps such as messenger whatsapp etc do not even bother to switch the privacy setting off in regard to microphone and camera!! so theres not positive intention there energetically either!

in a cafe for example i or my friends might not have a mobile device but other people in the cafe do and their mobile devices will pick up everything going on in that space!
 
Several of your quote are precise and left me puzzled. It showed me additional hardware parts definitely useable for monitoring purposes. Quite a whole structure - not restricted to the idea of "Mic on /mic off"!

A few years ago I was implementing a software GPRS tunneling proof of concept for T-Mobile. Even in the proof of concept, there was a requirement to be able to redirect the GPRS tunnel outside of T-Mobile's infrastructure, for lawful interception needs.
Out of curiosity, what does such infrastructure work on in term of protocol? Is the data going through some basic IP conduit?

My fingerprint was way way more unique than hers, so I was more trackable between websites.
Well, this makes much sense, again, thank you for hinting at this. It's obvious! I remember a time when I was using Linux, with some stuff called pidgin, supposed to act some form of local VPN (pidgin was Tor). And so I would have all communications go through Tor, believing that it would be anonymous. This is to say that if somebody uses Linux+Pidgin, I would not encourage it in term of anonymity. In addition, as KJS say, your fingerprint becomes unique in regard of the web and so you would end up faster under monitoring.

But well - let's sate it for people who don't feel okay with such thing: we don't really need to fear all of those things, because we have nothing to hide. Sensitive documents should be placed on some computer without Internet, if required, and personal data too (personal pictures).
 
" computer without Internet (...) " , well about that, this is second hand knowledge so don't have a name or article to point to , so ymmv , but remember someone telling me early 2000's , that a public figure from microsoft (iiirc ) stated after departing it , that no computer plugged in to a power grid outlet was safe so.... ( somewhat pointing to this possiblity , there is comercially available network hardware that uses "formal "power lines for data , on local networks , even if not usually know/available )
 
" computer without Internet (...) " , well about that, this is second hand knowledge so don't have a name or article to point to , so ymmv , but remember someone telling me early 2000's , that a public figure from microsoft (iiirc ) stated after departing it , that no computer plugged in to a power grid outlet was safe so.... ( somewhat pointing to this possiblity , there is comercially available network hardware that uses "formal "power lines for data , on local networks , even if not usually know/available )
My above take was not 100% the reflection of what I had in mind and your post helped me to reach my conclusion: storing sensitive data on an external computer in order to prevent loss of data (this implying that one should not care for anonymacy too much).

Pff Thank you Ricardo - tough I am not sure if I was even capable of reaching such conclusion - but overall that's what I had in mind!
 
interesting thread from mozilla firefox users regarding their sell out move on privacy and personal data

good to read the comments posted there


 

Trending content

Back
Top Bottom