Comments 1 - 40 of 305 Next » Last » Search these comments
Hopefully with Trump hewont allow this project to fail.will allow the marketplace to determine the value and success of a product.
FTFY
Tenpoundbass saysthere was deep pocket interests that squashed the project.
care to elaborate?
Tenpoundbass saysthere was deep pocket interests that squashed the project.
care to elaborate?
The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.
Patrick saysThe Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.
Is the company called Pied Piper?
Google...cut off...Open Source phones.
Getting started with developing applications for a mobile platform can be a challenging task, especially when it comes to building and testing the application on the mobile device itself.
The Librem 5 makes its application development workflow extremely simple.
You don’t need to worry about registering a developer account with some parent company.
You don’t need to register your testing devices and ask the permission to a parent company just to be able to build and run your applications on those devices.
You don’t need to “Jailbreak” your devices in order to access some restricted software or hardware features.
And the best part is that you don’t need to worry about cross platform compiling because you can use the development tools directly on the phone.
The “quick start” video below that I made for the Librem 5 developers documentation demonstrates how quickly you can get up and running with making your own GTK applications on a Librem 5.
In this video, I have attached a Librem 5 to an external keyboard, mouse and monitor through a USB-C hub, and I use GNOME Builder to quickly create a new GTK application project, build it and run it on both the big desktop monitor and the small mobile screen with just a drag and drop across the screens.
Yes, I do all that with the computing power of the Librem 5 only! There are no special effects nor a hidden desktop computer. I even did the screencast recording with an external device so it shows the real speed of the Librem 5 when driving a 32″ Full HD monitor.
School custodian refuses to download phone app that monitors location, says it got her fired
Increase in 'tattleware' a slippery slope for loss of workers’ privacy, employment lawyer warns ...
When her boss told her to download the app, Dionne says she was concerned about her privacy. The app would go on her personal phone and, she says, her boss didn't clearly explain how it worked or what would happen to any data it collected.
"It was just a blanket statement — 'Everybody install this app on their phone. This is how we're doing things from now on,'" said Dionne. ...
"We are giving away a lot of our privacy rights without even realizing what we're giving up," she said. "Before it's too late and we go down some slippery slope, it's time that we looked at this."
Dionne says it was a blow to be fired, but the experience has a silver lining.
She now wants to learn how to help other employees who feel they weren't treated right, either.
"I'm going back to school," said Dionne. "I'm thinking of going into law."
'Everybody install this app on their phone. This is how we're doing things from now on,'
'Everybody install this app on their phone.
Court scolds FBI for partnering with Google and others on warrantless surveillance but then renews it ...
In a ruling, the surveillance court reprimanded the FBI for multiple episodes of analysts improperly searching for data involving Americans through the warrantless surveillance program. Despite the violations, and general controversy surrounding the program, the court still re-approved it for another year. ...
The law allows the NSA, with the help of tech companies such as AT&T and Google, to harvest online messages and phone calls of non-citizens who are abroad without the need for a warrant. However, often these communications are between foreigners and Americans, which raises the question whether there should be different rules for US citizens’ messages that get intercepted.
The NSA provides relevant data from the program to the FBI, CIA, and the National Counterterrorism Center. The FBI receives data that the NSA deems relevant for investigation for national security reasons. ...
The court also recounted such episodes in its ruling the previous year. Despite the violations, the judge still approved the program for another year.
“While the court is concerned about the apparent widespread violations of the querying standard,” Judge Boasberg wrote, “it lacks sufficient information at this time to assess the adequacy of the F.B.I. system changes and training, post implementation.” Therefore, the court concluded that “the FBI’s querying and minimization procedures meet statutory and Fourth Amendment requirements.”
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.
Recent leaks and public records requests have revealed that U.S. law enforcement in Baltimore, Milwaukee, New York, Tacoma, Anaheim, Tucson, and others have used IMSI-catchers extensively in vehicles or aircraft to identify and locate suspects.
These powerful surveillance devices have often been used with little to no judicial oversight. To provide transparency and accountability, we need independent information on who uses them, how often, and when.
SeaGlass sensors collect and upload cell tower signal data to our server where algorithms look for IMSI-catcher signatures.
Main Sensor Parts
Raspberry Pi computer
Cellular modem to scan the cell spectrum
GPS
Bait cellphone
Mobile hotspot to upload data...
To covertly transmit on the same frequencies as the normal cellular network, IMSI-catchers may mimic the identifying properties (mcc, mnc, cell id, etc.) of legitimate cell towers. We expect IMSI-catchers to prefer transmitting strong signals to capture phones and to be some distance away from the towers they may mimic to avoid interference with the real cell tower.
By building a model for each cell tower of how its signals should appear from different positions, we can flag cell tower transmissions that do not match those expected from a legitimate cell tower. This image shows all the measurements of cell ID 7843, where darker colors are stronger signal strengths and larger sizes represent how statistically unlikely the measurement is.
Google employees admit in lawsuit that the company made it nearly impossible for users to keep their location private
Google made it nearly impossible for users to keep their location private, according to newly unredacted court documents.
Even Google execs and employees in charge of location data were confused about how privacy settings worked.
Google was sued by Arizona's attorney general over its data collection practices last year.
Modern cellphones are vulnerable to attacks by governments and hackers using rogue cellular transmitters called IMSI-catchers. These surveillance devices can precisely locate phones, and sometimes eavesdrop on communications, send spam, or inject malware into phones.
So what is the best phone for privacy you can get now? I'm surprised there isn't a company stepping in to fill this void.
Will Verizon, et al, give you a SIM card for that Freedom phone?
Will Verizon, et al, give you a SIM card for that Freedom phone?
It should have hardware kill switches for mic, camera, gps, etc.
Unique IDs linked to phones are supposed to be anonymous. But there’s an entire industry that links them to real people and their address.
Tech companies have repeatedly reassured the public that trackers used to follow smartphone users through apps are anonymous or at least pseudonymous, not directly identifying the person using the phone. But what they don't mention is that an entire overlooked industry exists to purposefully and explicitly shatter that anonymity.
They do this by linking mobile advertising IDs (MAIDs) collected by apps to a person's full name, physical address, and other personal identifiable information (PII). Motherboard confirmed this by posing as a potential customer to a company that offers linking MAIDs to PII.
"If shady data brokers are selling this information, it makes a mockery of advertisers’ claims that the truckloads of data about Americans that they collect and sell is anonymous," Senator Ron Wyden told Motherboard in a statement.
Freedom phone looks promising.
How the FBI Tricked Criminals into Using its Messaging App
Hundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Fortwaynemobile saysFreedom phone looks promising.
As long as it's not just another FBI scam, like their "private" messaging app:
https://www.rollingstone.com/culture/culture-news/fbi-operation-trojan-shield-crime-messaging-app-1181168/How the FBI Tricked Criminals into Using its Messaging App
Hundreds of device users didn’t realize they were carrying the FBI in their back pockets — until they got arrested
Freedom phone looks promising.
Fortwaynemobile saysFreedom phone looks promising.
It's still based on android. And, I'm under the impression that android has a few closed source components. Unless the freedom phone can exclude these parts, google will likely still have their tentacles into your phone. The closed source stuff is likely where the NSA backdoor is.
But, my guess is it will still be somewhat of an improvement on privacy and ability to use apps, at least for now. I would imagine FP can prevent many types of data collection built into the os, but some will be hard to fight. For example, many apps use "push messaging" to save battery and reduce latency on data updates (like, to notify you that you have a new message). Google made it so every android app uses their push messaging server (so the phone only needs to call 1 google server, and that 1 call can get updates for potentially hundreds of apps at the same...
It's still based on android. And
Comments 1 - 40 of 305 Next » Last » Search these comments
Many others have attempted Open Source phones and failed. I hope this one works, especially since I just discovered that you cannot turn off wifi or Bluetooth on Android or iOS. "Turning it off" in the controls on those phones merely disconnects you from current access points, but leaves them on so they can spy on your location with great precision and open you up to various exploits:
https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off