2018 Aug 19, 10:49am
3,745 views 49 comments
Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.
On iOS 11, pressing the wifi toggle immediately disconnects the iPhone or iPad from any wifi networks, but leaves the wireless radio available for use by location services, scanning for the names of nearby wifi access points. The Bluetooth toggle operates in a similar fashion. ...A similar thing happens in Android smartphones, which use wifi as part of their location services. Switching wifi off prevents it from connecting to wifi access points, but allows it to continue periodically scanning for access point names to help pinpoint its location.
« First « Previous Comments 10 - 49 of 49 Last »
Google...cut off...Open Source phones.
Getting started with developing applications for a mobile platform can be a challenging task, especially when it comes to building and testing the application on the mobile device itself.The Librem 5 makes its application development workflow extremely simple.You don’t need to worry about registering a developer account with some parent company.You don’t need to register your testing devices and ask the permission to a parent company just to be able to build and run your applications on those devices.You don’t need to “Jailbreak” your devices in order to access some restricted software or hardware features.And the best part is that you don’t need to worry about cross platform compiling because you can use the development tools directly on the phone.The “quick start” video below that I made for the Librem 5 developers documentation demonstrates how quickly you can get up and running with making your own GTK applications on a Librem 5.In this video, I have attached a Librem 5 to an external keyboard, mouse and monitor through a USB-C hub, and I use GNOME Builder to quickly create a new GTK application project, build it and run it on both the big desktop monitor and the small mobile screen with just a drag and drop across the screens.Yes, I do all that with the computing power of the Librem 5 only! There are no special effects nor a hidden desktop computer. I even did the screencast recording with an external device so it shows the real speed of the Librem 5 when driving a 32″ Full HD monitor.
School custodian refuses to download phone app that monitors location, says it got her firedIncrease in 'tattleware' a slippery slope for loss of workers’ privacy, employment lawyer warns ...When her boss told her to download the app, Dionne says she was concerned about her privacy. The app would go on her personal phone and, she says, her boss didn't clearly explain how it worked or what would happen to any data it collected. "It was just a blanket statement — 'Everybody install this app on their phone. This is how we're doing things from now on,'" said Dionne. ..."We are giving away a lot of our privacy rights without even realizing what we're giving up," she said. "Before it's too late and we go down some slippery slope, it's time that we looked at this."Dionne says it was a blow to be fired, but the experience has a silver lining.She now wants to learn how to help other employees who feel they weren't treated right, either. "I'm going back to school," said Dionne. "I'm thinking of going into law."
'Everybody install this app on their phone. This is how we're doing things from now on,'
'Everybody install this app on their phone.
Court scolds FBI for partnering with Google and others on warrantless surveillance but then renews it ...In a ruling, the surveillance court reprimanded the FBI for multiple episodes of analysts improperly searching for data involving Americans through the warrantless surveillance program. Despite the violations, and general controversy surrounding the program, the court still re-approved it for another year. ...The law allows the NSA, with the help of tech companies such as AT&T and Google, to harvest online messages and phone calls of non-citizens who are abroad without the need for a warrant. However, often these communications are between foreigners and Americans, which raises the question whether there should be different rules for US citizens’ messages that get intercepted.The NSA provides relevant data from the program to the FBI, CIA, and the National Counterterrorism Center. The FBI receives data that the NSA deems relevant for investigation for national security reasons. ...The court also recounted such episodes in its ruling the previous year. Despite the violations, the judge still approved the program for another year.“While the court is concerned about the apparent widespread violations of the querying standard,” Judge Boasberg wrote, “it lacks sufficient information at this time to assess the adequacy of the F.B.I. system changes and training, post implementation.” Therefore, the court concluded that “the FBI’s querying and minimization procedures meet statutory and Fourth Amendment requirements.”
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.Recent leaks and public records requests have revealed that U.S. law enforcement in Baltimore, Milwaukee, New York, Tacoma, Anaheim, Tucson, and others have used IMSI-catchers extensively in vehicles or aircraft to identify and locate suspects.These powerful surveillance devices have often been used with little to no judicial oversight. To provide transparency and accountability, we need independent information on who uses them, how often, and when.SeaGlass sensors collect and upload cell tower signal data to our server where algorithms look for IMSI-catcher signatures.Main Sensor PartsRaspberry Pi computerCellular modem to scan the cell spectrumGPSBait cellphoneMobile hotspot to upload data...To covertly transmit on the same frequencies as the normal cellular network, IMSI-catchers may mimic the identifying properties (mcc, mnc, cell id, etc.) of legitimate cell towers. We expect IMSI-catchers to prefer transmitting strong signals to capture phones and to be some distance away from the towers they may mimic to avoid interference with the real cell tower.By building a model for each cell tower of how its signals should appear from different positions, we can flag cell tower transmissions that do not match those expected from a legitimate cell tower. This image shows all the measurements of cell ID 7843, where darker colors are stronger signal strengths and larger sizes represent how statistically unlikely the measurement is.
Google employees admit in lawsuit that the company made it nearly impossible for users to keep their location privateGoogle made it nearly impossible for users to keep their location private, according to newly unredacted court documents.Even Google execs and employees in charge of location data were confused about how privacy settings worked.Google was sued by Arizona's attorney general over its data collection practices last year.
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.
So what is the best phone for privacy you can get now? I'm surprised there isn't a company stepping in to fill this void.
Will Verizon, et al, give you a SIM card for that Freedom phone?
It should have hardware kill switches for mic, camera, gps, etc.
Unique IDs linked to phones are supposed to be anonymous. But there’s an entire industry that links them to real people and their address.Tech companies have repeatedly reassured the public that trackers used to follow smartphone users through apps are anonymous or at least pseudonymous, not directly identifying the person using the phone. But what they don't mention is that an entire overlooked industry exists to purposefully and explicitly shatter that anonymity.They do this by linking mobile advertising IDs (MAIDs) collected by apps to a person's full name, physical address, and other personal identifiable information (PII). Motherboard confirmed this by posing as a potential customer to a company that offers linking MAIDs to PII."If shady data brokers are selling this information, it makes a mockery of advertisers’ claims that the truckloads of data about Americans that they collect and sell is anonymous," Senator Ron Wyden told Motherboard in a statement.
Freedom phone looks promising.
How the FBI Tricked Criminals into Using its Messaging AppHundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Fortwaynemobile saysFreedom phone looks promising.As long as it's not just another FBI scam, like their "private" messaging app:https://www.rollingstone.com/culture/culture-news/fbi-operation-trojan-shield-crime-messaging-app-1181168/ How the FBI Tricked Criminals into Using its Messaging AppHundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Fortwaynemobile saysFreedom phone looks promising.It's still based on android. And, I'm under the impression that android has a few closed source components. Unless the freedom phone can exclude these parts, google will likely still have their tentacles into your phone. The closed source stuff is likely where the NSA backdoor is.But, my guess is it will still be somewhat of an improvement on privacy and ability to use apps, at least for now. I would imagine FP can prevent many types of data collection built into the os, but some will be hard to fight. For example, many apps use "push messaging" to save battery and reduce latency on data updates (like, to notify you that you have a new message). Google made it so every android app uses their push messaging server (so the phone only needs to call 1 google server, and that 1 call can get updates for potentially hundreds of apps at the same...
It's still based on android. And
How NSO's Pegasus Is Used to Spy on JournalistsIsraeli firm NSO's Pegasus software is used to infect journalists phones in what is called 'zero clicks'. Here's how they did it and what we found out
Revealed: leak uncovers global abuse of cyber-surveillance weaponSpyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests ...Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak.The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus, which the company insists is only intended for use against criminals and terrorists.Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016.
Huge data leak shatters the lie that the innocent need not fear surveillance
The Freedom Phone is made in Communist China and is nothing more than a $120 phone being sold for $500.Yet another conservative con gamehttps://www.nydailynews.com/news/national/ny-freedom-phone-made-china-cheap-rebrand-20210716-ye2coq5r5nfthgt4vc4cw2ugby-story.html
“Data privacy” is one of those terms that feels stripped of all emotion. It’s like a flat soda. At least until America’s failures to build even basic data privacy protections carry flesh-and-blood repercussions.This week, a top official in the Roman Catholic Church’s American hierarchy resigned after a news site said that it had data from his cellphone that appeared to show the administrator using the L.G.B.T.Q. dating app Grindr and regularly going to gay bars. Journalists had access to data on the movements and digital trails of his mobile phone for parts of three years and were able to retrace where he went.
The Freedom Phone is made in Communist China and is nothing more than a $120 phone being sold for $500.Yet another conservative con game
In short, the phone in your hand exists in a state of perpetual insecurity, open to infection by anyone willing to put money in the hand of this new Insecurity Industry. The entirety of this Industry’s business involves cooking up new kinds of infections that will bypass the very latest digital vaccines—AKA security updates—and then selling them to countries that occupy the red-hot intersection of a Venn Diagram between “desperately craves the tools of oppression” and “sorely lacks the sophistication to produce them domestically.”An Industry like this, whose sole purpose is the production of vulnerability, should be dismantled. ...If you want to see change, you need to incentivize change. For example, if you want to see Microsoft have a heart attack, talk about the idea of defining legal liability for bad code in a commercial product. If you want to give Facebook nightmares, talk about the idea of making it legally liable for any and all leaks of our personal records that a jury can be persuaded were unnecessarily collected. Imagine how quickly Mark Zuckerberg would start smashing the delete key.
« First « Previous Comments 10 - 49 of 49 Last »