view the rest of the comments
the_dunk_tank
It's the dunk tank.
This is where you come to post big-brained hot takes by chuds, libs, or even fellow leftists, and tear them to itty-bitty pieces with precision dunkstrikes.
Rule 1: All posts must include links to the subject matter, and no identifying information should be redacted.
Rule 2: If your source is a reactionary website, please use archive.is instead of linking directly.
Rule 3: No sectarianism.
Rule 4: TERF/SWERFs Not Welcome
Rule 5: No ableism of any kind (that includes stuff like libt*rd)
Rule 6: Do not post fellow hexbears.
Rule 7: Do not individually target other instances' admins or moderators.
Rule 8: The subject of a post cannot be low hanging fruit, that is comments/posts made by a private person that have low amount of upvotes/likes/views. Comments/Posts made on other instances that are accessible from hexbear are an exception to this. Posts that do not meet this requirement can be posted to !shitreactionariessay@lemmygrad.ml
Rule 9: if you post ironic rage bait im going to make a personal visit to your house to make sure you never make this mistake again
Every cell phone, even dumb phones, can track you with a warrant or Stingray. Rather than picking which is better, understand that every single cellphone is snitching on you and act accordingly.
To be clear, it is possible to defend yourself, but ofc no defense is perfect. For illegal activities that might attract federal attention? best to avoid them at all costs. But for general privacy in your day to day life that isn't practical for most people, and "every cellphone is snitching on you" is way too reductive, even if it's true in a sense.
For example the person you are replying to mentions Linux phones, many of which publish schematics and make hardware kill switches for the discrete modem a big selling point. That still isn't perfect protection, but it would protect you from a stingray... and if you have a thought out threat model, you can make the choice whether or not that device is appropriate for your situation.
Let me be clear first: If you want to get rid of advertising, then yes your advise is OK. If you want to defend against the Surveillance system, it's not close to adequate. This is the fundamental gap I'm trying to address.
I understand where your heart is at, but you are making a mistake. Free/Libre software is about Freedom, and from that guarantee we can build other guarantees about security and privacy. However Freedom itself does not guarantee security nor privacy. Freedom is also the freedom to shoot yourself in the foot.
There is a perfect defense: Don't use technology. Much of this advise is trying to use technology to fight technology. It's a rabbit hole that has no bottom, and the best defense is to not play. The problem is attack surface. Technology is incredibly complex and is chattier than your extroverted :LIB: friend at brunch, and boy howdy do people love to listen! You can reduce this attack surface, but it never goes away as long as you are using technology.
Here's the trail crumbs you might make on the Web as you browse each and every website:
You can use custom software for #3 and #4 on the device (most of the advise here), but do you block google.com? You can use a network DNS blocker (e.g. Pi-Hole) for #1, #3, #4, and some of #7, but that only works on networks you control. VPNs advertise as solving #2, but that's pure ideology; it only moves where the routing traffic goes and still can log information in transit.
This also ignores data brokers who buy all of this information and compile it together.
And this is just the advertising/surveillance defense against tech companies. I haven't even touched or defense.
if your threat is state-level actors your computer security is approximately moot and maybe you should spend your money on laywers and having a discreet way out of the country
That's not necessarily true. Police are purchasers of this data from data brokers. It's state surveillance without any need for a warrant.
Nope , not if I don't use a sim.
That's not protection, and worse its giving you a false sense of security. I don't make my recommendations because I hate tech, but because (from a security posture) the attack surface is so large it is impossible to verify it cannot be used against you, and the consequences of that mistake are life-altering.
A SIM merely says you are Authorized to use the network. The phone still makes connections to the cellular network. All phones on the market allow emergency calls even without a SIM card.
Both your cellular chip and your WiFi chip broadcast their unique MAC address to every router/tower they see, and all of this information is logged.
Just like a burner phone, police can get the location data from the carrier and towers, and use that to trace where that phone went. If you brought that phone near other devices, those devices or your own location can be deduced.
You see this over and over: Big Protest ➡ Police Geofence warrant ➡ Cell logs ➡ Arrests. Given the criminalization of protests this will become the norm. If you want to get rid of advertising, many of the suggestions here are fine. But none of them go far enough to protect you beyond that, even from Big Tech surveillance.
True that for just using a sim card less phone.
However
GOS airplane mode disable any connection to the cellular network. If I'm wrong if love to hear some evidence to the contrary.
It's not that we are wrong or right, we cannot verify. That is the danger. In a high security environment I treat everything as suspect until proven otherwise. However when you do not use technology you categorically exclude an entire attack surface, and it is extremely simple to get right.
Sure , not using a phone is of course the best option. If that is an option. For most people, activist or criminals of any kind. Not usually an option.
You can at least verify the Foss code. Or trust the people that verify it.
I'm not responding to be mean, so I'm sorry if this feels like bullying. I've had friends and comrades arrested and jailed, and I don't want anybody falling into that trap if it can be easily avoided. I'm trying to point out the Ideologies (*sniff* ), the things you don't know you know, so that you can operate a much stronger security posture.
The first Ideology is using the same device in both high and low security environments. Don't. Use multiple devices and compartmentalize aggressively. In security posture, you are only as secure as your weakest point. This is why those "criminals" use a different burner phone. Using a single device to communicate with grandma and radicals is a recipe for baking and arrest. I consider a low-security place where I shitpost and goof off, but I absolutely do not engage in any here because it would be trivial to trace it to me. Same with my regular cell phone, which I text grandma baking recipes but never use it during protests.
The second Ideology is thinking you are excluded from those so called "activists and criminals" while participating in very leftists and public online spaces. I guarantee and watch both Lemmygrad and Hexbear as I type this, and they don't give a single ! Rude! To them we are all being gay and doing crime. Have fun giving them but you deliberately never go beyond that.