$0.61 total tips
Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.
On iOS 11, pressing the wifi toggle immediately disconnects the iPhone or iPad from any wifi networks, but leaves the wireless radio available for use by location services, scanning for the names of nearby wifi access points. The Bluetooth toggle operates in a similar fashion. ...A similar thing happens in Android smartphones, which use wifi as part of their location services. Switching wifi off prevents it from connecting to wifi access points, but allows it to continue periodically scanning for access point names to help pinpoint its location.
« First « Previous Comments 77 - 116 of 119 Next » Last »
Anyone found a good privacy friendly phone yet?My moto g5 plus is flaking out and I don't want another phone that constantly spies on me.
I'm fucking sick of smartphones. My work seems to have endless reasons why they want me to use my personal phone. So far I've told them I don't have a data plan, but there's wifi, so sure that won't hold up forever. As soon as I have time, going to look into prepaid shit phones that don't have app capability. The internet and cellphones have become so locked down it's ridiculous.
I started accumulating cheap smartphones and tablets for this reason
2FA is becoming popular, especially for those who work in tech companies, and they seem to want their employees to use their personal phones to either install the 2FA app, or to receive text messages. A 2nd dummy device can work well for this use case too.
I was looking at Ubuntu touch which can run on my Pixel.
Is there any truth to a new Tesla phone coming out? It is supposed to be 100% private.
But if you use a password manager to create unique passwords of 20+ characters for every account you have, that is WAY better security than any secondary authentication.
It does nothing to prevent them from copying your password. 2FA adds strong protection against both. 2FA defends against a different category of attacks that using only a strong password cannot help with. It's a fact.
How could a person defeat that? No one else has my phone.
How will they copy my password? You're talking about a key logger? Or physically stealing my device? Neither of those would work since I copy my password from a password manager that's set to wipe it from clipboard five seconds after I copy it. My password manager password you say? I don't have one. USB key. And my laptop is encrypted. So unless they jack my laptop while I'm on it, and make sure to get my usb card, they won't have shit.
2FA, you think it's fullproof?
Any good security expert will tell you another layer of complexity, poorly implemented is actually providing a bigger attac...
I fucking guarantee your 2FA implementation will leave you exposed.
Ya, poorly implemented. I would bet BIG BUCKS that the vast majority of users of the vast majority of 2FA implementations significantly enhance security. And I bet security experts would bet with me, not against me on that.
Exploiting 2FA alone buys you nothing.
2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.
AmericanKulak says2FA is bullshit, it's about getting mobile phone numbers (or at least emails) from PC users, and passwords to match with the phone from Phone Users.Woah, good point. I had not considered it, but it makes sense.
Hircus says Exploiting 2FA alone buys you nothing. Session hijacking? XSS? I don't need your password, I just need to access your account once and I can change it. Worse, if I steal your mobile device(more likely since you probably take it everywhere), I now have access to all your 2FA codes. I simply go to your sites, click the forgot password link, and easily gain access.
Exploiting 2FA alone buys you nothing.
And you haven't addressed the HUGE loss of privacy 2FA entails. I don't see enough advantages over the method I've proposed that would ever justify giving up my privacy/freedom.
Hackers can break into your iPhone even when it's switched off. Cybersecurity researchers have discovered a way to run malware on Apple's iPhones, even when the device is switched off.
For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network.
June 28, 2022Russia fines Threema app for not collecting user dataFined under "anti-terror" laws.By Ken MaconA court in Moscow fined Switzerland based messenger service Threema for refusing to comply with the Russian “anti-terror” law.Threema competes with Telegram and Signal.Threema was found guilty of non-compliance with rules under the anti-terror law. The law requires tech companies to store data, such as calls, messages, emails, photos, and videos, on their servers for at least six months, and allow the government access to that data if requested.Speaking to German news outlet Welt am Sonntag, a spokesperson for Threema said that Russian authorities “apparently launched an investigation in March 2022 probably to make an example.”“Of course, under no circumstances will we hand over any data to Russian authorities,” Threema added, arguing it is governed by Swiss law, which does not allow the transfer of user data to other countries, much less authoritarian countries like Russia.The company will also not pay the fine.
July 4, 2022From this week, all new vehicles in the EU with have to have a surveillance-based speed limiterGPS is the most common method.Tracking and surveillance tech is finding its use in yet another segment of public life in the West – road traffic. ...For the moment, they are “opt-in,” since drivers can still turn them off. But, the plan is to remove this option completely.
July 8, 2022Royal Canadian Mounted Police used smartphone malware to spy on targetsA breach of rules.Members of the Royal Canadian Mounted Police (RCMP) have been using malware in their investigations since 2018 that can secretly turn phones and laptops into full-fledged spying devices, with the news, and some, but not all details about the program only just emerging now.Traditionally unwilling to “share” what types of surveillance technology it uses unless it has to, mostly pressed during inquiries, this time once again the public is becoming aware of the facts a full four years after the software was first deployed.
July 30, 2022Tim Hortons offers customers a free coffee and baked item in settlement for spying on peopleThe company's invasive tracking was revealed this year.As settlement in class action lawsuits, Canadian coffee giant Tim Hortons will offer a free hot beverage and a baked good as an apology for tracking the location of users of its app. The app tracked users when they left or entered a Tim Hortons competitor such as Starbucks, their home or workplace, and more.In June, regulators said that the data collection was in violation of the law.“Tim Hortons clearly crossed the line by amassing a huge amount of highly sensitive information about its customers. Following people’s movements every few minutes of every day was clearly an inappropriate form of surveillance.
Amazon just bought Roomba, which means if you have one Amazon will soon have an extremely valuable map of the inside of your home
No one should ever install any app. Anything an app does can also be done by a web page these days. The only reason the want you to install an app is to do exactly this kind of spying on your every movement.