10
1

A phone which does not spy on you


 invite response                
2018 Aug 19, 10:49am   35,694 views  254 comments

by Patrick   ➕follow (55)   💰tip   ignore  

https://puri.sm/shop/librem-5/

Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.

A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.

The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.


Many others have attempted Open Source phones and failed. I hope this one works, especially since I just discovered that you cannot turn off wifi or Bluetooth on Android or iOS. "Turning it off" in the controls on those phones merely disconnects you from current access points, but leaves them on so they can spy on your location with great precision and open you up to various exploits:

https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off

On iOS 11, pressing the wifi toggle immediately disconnects the iPhone or iPad from any wifi networks, but leaves the wireless radio available for use by location services, scanning for the names of nearby wifi access points. The Bluetooth toggle operates in a similar fashion. ...

A similar thing happens in Android smartphones, which use wifi as part of their location services. Switching wifi off prevents it from connecting to wifi access points, but allows it to continue periodically scanning for access point names to help pinpoint its location.




« First        Comments 66 - 105 of 254       Last »     Search these comments

66   Patrick   2021 Nov 13, 11:21pm  

I used to work at Craigslist and I believe that was indeed the case.

It was purely an anti-competitive move by bigger companies like Facebook.
67   Patrick   2021 Dec 1, 1:40pm  

https://reclaimthenet.org/israel-is-using-counter-terrorism-phone-surveillance-to-track-omicron-carriers/


November 30, 2021
Israel is using counter-terrorism phone surveillance to track Omicron carriers
The implementation could be illegal.
69   NuttBoxer   2021 Dec 13, 10:48pm  

I'm fucking sick of smartphones. My work seems to have endless reasons why they want me to use my personal phone. So far I've told them I don't have a data plan, but there's wifi, so sure that won't hold up forever. As soon as I have time, going to look into prepaid shit phones that don't have app capability. The internet and cellphones have become so locked down it's ridiculous.
70   seesaw   2021 Dec 14, 5:25am  

Time to De-Google.. See Rob Braxman on Youtube.
https://www.youtube.com/watch?v=HVL1Xr7IEsY&source=patrick.net
Best Privacy phone. Rob seems very intelligent
71   Bd6r   2021 Dec 14, 12:35pm  

NuttBoxer says
As soon as I have time, going to look into prepaid shit phones that don't have app capability.

L8star Small Mini flip Cell Phone Magic Voice Changer Bluetooth Dialer Cellphone BM60 ca. 35 $
your employer's brain would freeze - they would have no idea what to do with this!
72   Eric Holder   2021 Dec 14, 12:50pm  

NuttBoxer says
I'm fucking sick of smartphones. My work seems to have endless reasons why they want me to use my personal phone. So far I've told them I don't have a data plan, but there's wifi, so sure that won't hold up forever. As soon as I have time, going to look into prepaid shit phones that don't have app capability. The internet and cellphones have become so locked down it's ridiculous.


Motorola F3: no GPS, no contacts, no nothing. =))
73   NuttBoxer   2021 Dec 14, 1:04pm  

Finding a non-smartphone that is supported by carriers is tricky. Was looking at nokia 3310, but not sure there's any carriers who support it, and will allow me to remain anonymous.
74   Eric Holder   2021 Dec 14, 1:44pm  

NuttBoxer says
Finding a non-smartphone that is supported by carriers is tricky. Was looking at nokia 3310, but not sure there's any carriers who support it, and will allow me to remain anonymous.


If a phone is capable of using US GSM frequencies it will be supported by the carriers.
75   joshuatrio   2022 Jan 3, 6:31am  

Anyone found a good privacy friendly phone yet?

My moto g5 plus is flaking out and I don't want another phone that constantly spies on me.
76   clambo   2022 Jan 3, 7:15am  

I was looking at Ubuntu touch which can run on my Pixel.
77   GNL   2022 Jan 3, 8:41am  

Is there any truth to a new Tesla phone coming out? It is supposed to be 100% private.
78   RWSGFY   2022 Jan 3, 10:36am  

joshuatrio says
Anyone found a good privacy friendly phone yet?

My moto g5 plus is flaking out and I don't want another phone that constantly spies on me.


Motorola F3.
79   Hircus   2022 Jan 3, 3:56pm  

NuttBoxer says
I'm fucking sick of smartphones. My work seems to have endless reasons why they want me to use my personal phone. So far I've told them I don't have a data plan, but there's wifi, so sure that won't hold up forever. As soon as I have time, going to look into prepaid shit phones that don't have app capability. The internet and cellphones have become so locked down it's ridiculous.


I started accumulating cheap smartphones and tablets for this reason (can often buy them for $30-50). Sometimes its tough to avoid installing an app to use some handy device, but I refuse to allow some chinese app to invade my phone. So I just keep a dummy device that uses a throwaway email address and no contacts / personal info etc... and install the apps on that, keeping my real phone clean. I don't even bother with a sim, just wifi.

2FA is becoming popular, especially for those who work in tech companies, and they seem to want their employees to use their personal phones to either install the 2FA app, or to receive text messages. A 2nd dummy device can work well for this use case too.
80   Patrick   2022 Jan 4, 12:31am  

Hircus says
I started accumulating cheap smartphones and tablets for this reason


I like this idea.

Hircus says
2FA is becoming popular, especially for those who work in tech companies, and they seem to want their employees to use their personal phones to either install the 2FA app, or to receive text messages. A 2nd dummy device can work well for this use case too.


At one previous company, I just ran a phone emulator on my laptop to run the 2FA app.
81   NuttBoxer   2022 Jan 4, 9:42am  

clambo says
I was looking at Ubuntu touch which can run on my Pixel.


Ubuntu is less privacy focused than they used to be. Started when they introduced their new app store, wanna say it's called Unity back in lts16 I believe.
82   NuttBoxer   2022 Jan 4, 9:44am  

Hircus says
2FA is becoming popular, especially for those who work in tech companies, and they seem to want their employees to use their personal phones to either install the 2FA app, or to receive text messages. A 2nd dummy device can work well for this use case too.


For this I signed up for 1Password using an email not associated to me. Works well, and if my employer removes that option, will insist they send me a fob.
83   NuttBoxer   2022 Jan 4, 9:45am  

WineHorror1 says
Is there any truth to a new Tesla phone coming out? It is supposed to be 100% private.


I would trust Tesla anything as much as Windows anything. Musk is a wolf in sheeps clothing, and possible the first AI human due to his neural net implants.
84   GNL   2022 Jan 4, 12:05pm  

Could anyone explain what 2FA is please?
85   NuttBoxer   2022 Jan 4, 12:23pm  

Simplest explanation, it's bullshit. A lazy man's excuse for not making a good password.

Longer explanation, it's a second authentication method meant to verify only you have access to that site/account/data. First method is your password, second can be a text, push notification, or randomly generated code sent to your fob or password manager.

But if you use a password manager to create unique passwords of 20+ characters for every account you have, that is WAY better security than any secondary authentication.

My opinion, and I think there's a strong case, is dual auth/2fa was created to track us. 99% of people who use 2FA do it from a personal cellphone.

2FA = Two Factor Authentication.
86   Hircus   2022 Jan 4, 7:08pm  

NuttBoxer says

But if you use a password manager to create unique passwords of 20+ characters for every account you have, that is WAY better security than any secondary authentication.


I dont see how one could backup such an argument. 2FA clearly offers meaningful security benefits that you cannot get by just making your password stronger. Whatever strong password you use, will always be improved upon by adding 2FA to it.

A strong password ONLY defends against attackers who try to guess your password. It does nothing to prevent them from copying your password. 2FA adds strong protection against both. 2FA defends against a different category of attacks that using only a strong password cannot help with. It's a fact.

Here's an example: a strong password is easily copied and successfully reused by an attacker some minutes/hours/days in the future. If the account had 2FA enabled, the attacker could not succeed merely by copying attacks, because they cannot copy a 2FA token, because they're 1 time use and expire in a short period of time.

The typical setup where people use a laptop/desktop with a password manager program locally installed as their main computer / web browser benefits by using 2FA on a separate device. There's many cases where an attack / compromise may be made on the laptop, even if just temporarily, or partially, but the attackers ability to gain access to their online accounts is still not successful because they have not also compromised the separate 2FA device.

Even power users, like us software engineers, benefit from 2FA. There's so many attacks that a keen eye just cannot avoid, much less realize they have even occurred.

Using 2FA on a physically separate device is a significant security boost.
87   GNL   2022 Jan 4, 7:31pm  

Ok, I understand what 2FA is now. I have a Stripe account for my business. Every time I log in, I get a text with a code which I then have to enter in order to complete the log in. How could a person defeat that? No one else has my phone.
88   NuttBoxer   2022 Jan 4, 10:20pm  

Hircus says
It does nothing to prevent them from copying your password. 2FA adds strong protection against both. 2FA defends against a different category of attacks that using only a strong password cannot help with. It's a fact.


How will they copy my password? You're talking about a key logger? Or physically stealing my device? Neither of those would work since I copy my password from a password manager that's set to wipe it from clipboard five seconds after I copy it. My password manager password you say? I don't have one. USB key. And my laptop is encrypted. So unless they jack my laptop while I'm on it, and make sure to get my usb card, they won't have shit.

But what about 2FA, you think it's fullproof? Texts can't be intercepted? Apps can't be spoofed? Any good security expert will tell you another layer of complexity, poorly implemented is actually providing a bigger attack surface, not making you more secure. And if you're not using a password manager(offline preferably), I fucking guarantee your 2FA implementation will leave you exposed.
89   NuttBoxer   2022 Jan 4, 10:24pm  

WineHorror1 says
How could a person defeat that? No one else has my phone.


You are aware cellphones get hacked just like any other computer right? Texts are not a secure method of communication. You are now dependent on Stripe, AND your mobile carrier to keep things patched and up to date.

Also, most hacking is social, or contains huge social components. Years ago I was able to get concert tickets sent to a new email just by calling ticketmaster, without providing any proof I had purchased them, or owned the existing email.
90   Hircus   2022 Jan 5, 12:52am  

NuttBoxer says
How will they copy my password? You're talking about a key logger? Or physically stealing my device? Neither of those would work since I copy my password from a password manager that's set to wipe it from clipboard five seconds after I copy it. My password manager password you say? I don't have one. USB key. And my laptop is encrypted. So unless they jack my laptop while I'm on it, and make sure to get my usb card, they won't have shit.


Sounds like you put some good effort and thought into it, and have a good setup that reduces the number of attack vectors. But your password can still be copied, and 2FA would help in many of those scenarios. Exploits have existed in the past, and will exist in the future for your OS, browser, extensions, and other software. Every bit of software is a potential vector. Sometimes they allow an attacker root access, but more often they dont - they allow some limited access that lets them read or write a file, or trigger an action, and they get clever and combine things to manipulate other software on the system to do their dirt for them. This is the magic of additional security layers - it makes it more difficult for someone w/ non root to do these things, and often still helps even when they get root. Additional security layers are the safety net for when something goes wrong, and things do go wrong.

Even if the copying doesn't occur on your computer, it can happen in transit, or on the remote server.

Anyway, I don't think were really talking about you specifically, are we? Were talking about users and 2FA in general.

NuttBoxer says
2FA, you think it's fullproof?


I never said that, nor did I imply it. I always used relative improvement terms like "security boost".

NuttBoxer says
Any good security expert will tell you another layer of complexity, poorly implemented is actually providing a bigger attac...


Ya, poorly implemented. I would bet BIG BUCKS that the vast majority of users of the vast majority of 2FA implementations significantly enhance security. And I bet security experts would bet with me, not against me on that.



NuttBoxer says
I fucking guarantee your 2FA implementation will leave you exposed.

How? The benefit of using 2FA is they need both the password and the 2FA token. Exploiting 2FA alone buys you nothing.
91   NuttBoxer   2022 Jan 5, 9:08am  

Hircus says
Ya, poorly implemented. I would bet BIG BUCKS that the vast majority of users of the vast majority of 2FA implementations significantly enhance security. And I bet security experts would bet with me, not against me on that.


When I used to post on reddit in the subs concerning privacy/security, I usually got support for my outlook on 2FA being BS. 2FA users are unlikely to use a password manager, because they will think as you say, that the additional prompt will protect them, and thus they are more likely to-reuse passwords, or use shitty passwords. And that exposes them to more security risk than if they simply used good passwords, and NEVER re-used them.

Hircus says
Exploiting 2FA alone buys you nothing.


Session hijacking? XSS? I don't need your password, I just need to access your account once and I can change it. Worse, if I steal your mobile device(more likely since you probably take it everywhere), I now have access to all your 2FA codes. I simply go to your sites, click the forgot password link, and easily gain access.

And you haven't addressed the HUGE loss of privacy 2FA entails. I don't see enough advantages over the method I've proposed that would ever justify giving up my privacy/freedom.
92   Patrick   2022 Jan 18, 12:44pm  

https://notthebee.com/article/oh-canada-canadian-government-admits-they-secretly-tracked-87-of-canadians-cellphones-without-consent-during-the-covid-19-pandemic?source=patrick.net

Oh, Canada! Canuck Government Admits It Secretly Tracked 33 MILLION Cellphones Without Consent Due to Covid, Representing 87% of The Population 👀
93   Patrick   2022 May 4, 12:03pm  

https://notthebee.com/article/bombshell-new-documents-show-that-the-cdc-tracked-millions-of-phones-to-see-if-americans-obeyed-lockdown-orders?source=patrick.net

CDC Tracked Millions of Phones to See If Americans Followed COVID Lockdown Orders
Newly released documents showed the CDC planned to use phone location data to monitor schools and churches, and wanted to use the data for many non-COVID-19 purposes too.
WWW.VICE.COM

https://www.vice.com/en/article/m7vymn/cdc-tracked-phones-location-data-curfews?source=patrick.net
94   AmericanKulak   2022 May 4, 12:47pm  

2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.

They push it way to hard for it to be otherwise.
95   Patrick   2022 May 4, 12:57pm  

AmericanKulak says
2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.


Woah, good point. I had not considered it, but it makes sense.
97   AmericanKulak   2022 May 4, 3:08pm  

Patrick says

AmericanKulak says
2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.


Woah, good point. I had not considered it, but it makes sense.


They're also pushing people to apps instead of the Website. I don't put financial shit on my phone, period.
98   Patrick   2022 May 4, 5:20pm  

Apps are definitely evil.

If they don't want to spy on you then a web page is perfectly fine.
99   NuttBoxer   2022 May 5, 9:48am  

With the push for global digital ID's, regardless of what they are labeled, not sure how more people are not seeing 2FA for what it is, an early form of global ID. 2FA requires you tie your personal cellphone(in almost all cases), to an account. What do we know about cellphones? They track you, they record you, they listen to you. And they export reams of data about you back to the cellphone company, OS company, and app companies. And now you've joined that to additional data points at your work, where you spend the majority of your life.

An ankle monitor isn't this good.
102   Hircus   2022 May 17, 9:33pm  

NuttBoxer says

Hircus says

Exploiting 2FA alone buys you nothing.

Session hijacking? XSS? I don't need your password, I just need to access your account once and I can change it. Worse, if I steal your mobile device(more likely since you probably take it everywhere), I now have access to all your 2FA codes. I simply go to your sites, click the

forgot password

link, and easily gain access.

Ok, I interpreted what you said differently. I thought you meant that the usage of 2FA would introduce a new vulnerability in itself, allowing one to defeat 2fa, guaranteed to cause a security problem. What you meant was that 2FA would not solve all possible security problems, which it obviously cant.

NuttBoxer says
And you haven't addressed the HUGE loss of privacy 2FA entails. I don't see enough advantages over the method I've proposed that would ever justify giving up my privacy/freedom.


I don't need to address this. This, like so many of your "counter arguments" are just strawmen. Advancing / debating things I never said to make it sound like youre right and I'm wrong. This all started when you made the claim that 2fa has zero security benefits/applications, which is just so blatantly false. Whether or not you or other people wish to use it is an entirely different discussion. The use of anything always has pros and cons, and I never said that I think you or others need 2fa or anything like that.

For the record though, I don't disagree with your point about 2fa being a privacy issue. I think its a great point actually, and I can think of plenty of other issues with it, as I'm sure you have.
103   Hircus   2022 May 25, 1:46pm  

DooDahMan says
Hackers can break into your iPhone even when it's switched off. Cybersecurity researchers have discovered a way to run malware on Apple's iPhones, even when the device is switched off.


I always hated how they prevented removal of the battery. Preventing users from physical control, even if their original intention was for planned obsolescence for moar profit, and not big brother shit, but removal of control seems to lead to malicious shit later.

I suppose even with a removable battery, they could have added an extra internal battery like a desktop CMOS battery to accomplish this, but people would question that much more - why add an extra battery for the scenario when a user wants the battery removed?

This is why hardware switches on some of these new privacy phones is such a win. Well, assuming there's not some way to subvert the switch via software...
104   Eric Holder   2022 May 25, 2:37pm  

DooDahMan says
For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network.


Bullshit: I switched my phone off and all I could get from the Find My app on another device was my phone's last location.
105   Patrick   2022 Jun 28, 4:11pm  

https://reclaimthenet.org/russia-fines-threema-app-for-not-collecting-user-data/


June 28, 2022
Russia fines Threema app for not collecting user data
Fined under "anti-terror" laws.
By Ken Macon

A court in Moscow fined Switzerland based messenger service Threema for refusing to comply with the Russian “anti-terror” law.

Threema competes with Telegram and Signal.

Threema was found guilty of non-compliance with rules under the anti-terror law. The law requires tech companies to store data, such as calls, messages, emails, photos, and videos, on their servers for at least six months, and allow the government access to that data if requested.

Speaking to German news outlet Welt am Sonntag, a spokesperson for Threema said that Russian authorities “apparently launched an investigation in March 2022 probably to make an example.”

“Of course, under no circumstances will we hand over any data to Russian authorities,” Threema added, arguing it is governed by Swiss law, which does not allow the transfer of user data to other countries, much less authoritarian countries like Russia.

The company will also not pay the fine.

« First        Comments 66 - 105 of 254       Last »     Search these comments

Please register to comment:

api   best comments   contact   latest images   memes   one year ago   random   suggestions