Yes this is most unsettling.
"Canada's public health agency admits it tracked 33 million mobile devices during lockdown"
Leave phone at home folks. PHAC EM!
Yes this is most unsettling.
"Canada's public health agency admits it tracked 33 million mobile devices during lockdown"
Leave phone at home folks. PHAC EM!
How do you track if location is turned off?
How did you set it up! Shifty?
This X100
Graphene OS on a Pixel phone with an encrypted comm app, is the way of the future.
Can they track those inreach devices as easy as a cell?
Graphene OS on a Pixel phone with an encrypted comm app, is the way of the future.
Retard alert. Your “encrypted” comm app is a joke. And the gov can triangulate your position via cell tower pings even with location disabled.
The closest you’ll get would be to run a self compiled synapses/matrix server in a foreign country with your own generated certs and even then, if you’re running a VM on any cpu built in the last 10 years, there are backdoors via the Intel ME which has its own independent network stack. Every domestic VPS provider is rooted and it doesn’t matter what crypto you’re using.
If you’re think you’re safe from the 5 eyes by using Signal on a GrapheneOS phone then clearly you have no business giving comsec advices.
I'm guessing "inreach" is auto correct screwing you lol! Privacy device? yes and no.
With a sim card, I Imagine they can track every phone call and your location, within reason . WIth NO sim card, Graphene OS has GPS spoofing, MAC address scrambling, and TOR rerouting for all data and most importantly, OS hardening. Good luck cracking it, feds. YouTube it and visit their website.
OPSEC/PERSEC must always be observed, but its an amazing OS none the less.
EDIT: Even with a sim card, the security of these devices is pretty freeking amazing, just use your head.
Retard alert. Your “encrypted” comm app is a joke. And the gov can triangulate your position via cell tower pings even with location disabled.
The closest you’ll get would be to run a self compiled synapses/matrix server in a foreign country with your own generated certs and even then, if you’re running a VM on any cpu built in the last 10 years, there are backdoors via the Intel ME which has its own independent network stack. Every domestic VPS provider is rooted and it doesn’t matter what crypto you’re using.
If you’re think you’re safe from the 5 eyes by using Signal on a GrapheneOS phone then clearly you have no business giving comsec advices.
Oh geez you really have no idea what you’re taking about.
Anonymity on TOR has been gone for at least 5 years. All the exit nodes are comped.
GPS spoofing doesn’t do jack #### but help you not get caught by a suspicious wife
MAC address scrambling is also useless and anyone can do it since the good old days of wireless.
If you want to get serious, get an older X200 and nuke the Intel IME via libreboot and run a non systemD Linux distro.




























