NSA saysPower CycleI am The Government
>>527159032You are literally 20 years late. If someone has a secure system they don't post how it works online.
>>527159032bin it and get a baofeng
>>527159032Theoretically, you can’t. Not with modern day smartphones.You can only take preventative measures such as disabling all location services (gps chip), disabling the U1 chip, disabling Bluetooth and wifi, and enabling aeroplane mode/disabling mobile reception. And/or removing a SIM card.Or by obfuscating your internet data packets with vpns. Even then, there are ways such as crowd sourced wifi hotspots which send location and diagnostic information to the mobile provider which can be subpoenaed at courts request. You could revert to a dumb phone with only text and call capability but even those can be listened in on.If you were to keep an old smart phone with no sim and all onboard chips disabled it would be substantially harder to trace your traffic, then use a secondary phone purely for calls and texts. Ideally you want to be using paper letters or smoke signals though
>>527159032down the dunny sonny
The best way at present is encrypted communications software but even those have become under attack by the five eyes NSA surveillance establishment in recent years and will soon become irrelevant In future it may become more viable to send letters to people by drone rather than relying on a carriage service
>>527159416You can build your own phone and put a simcard on it
>>527159416TempleOS is the way.
>>527159032
>>527159032Plug itSimple as
>>527159032Throw it in a ditch or tie it to a dog or something than read books and get and landline.
>>527159032Here ya go, brohttps://koshercell.org/en-ca
That’s a Star of David.
IMHO we should stop using cell phone networks. According to privacy YouTuber Rob Braxman 5G lets your cell phone provider know where you are within inches: https://www.youtube.com/watch?v=IPrugkYJpO8&t=888s The more we use cell phone networks, the worse will these networks be upgraded. Also, Google and Apple track your location 24/7 and if the governments ever steal 100% of the location data it would be bad for us. The smartphone is a retarded invention, even more so than the lawnmower.
>>527159032That's not really how that works. Things get to your phone through infrastructure. It is this infrastructure which is already passively collecting and analyzing data, so they don't really need access to a domestic individual's phone. Advanced NSA metadata analysis can do things no warrant ever could with a high degree of certainty, it just depends on who has access to this data for which reasonsIn the realm of software security, it's essentially a fractal; there is no end to computer security, the closer you look the more you find. No-click RCE 0-days for the latest versions of iOS and Android go for millions of dollars, and various security agencies will buy them with no questions asked as long as the POC checks out but worry not; you'd have to be a person of profound interest in order to become an investment here and rest assured by this point you're already well beyond any conceivable measure of fuckedYou bet the have them for Graphene OS too though it's my understanding these units are fully encrypted OOB but that's nothing a little hardware hacking and access out outrageous level of CPU cycles can't solve, but again here you would have to be an exceptional remark of interestSo, the answer is you can't, but what you can do is keep yourself the least amount of interesting; though money is no object and there is a correlation between levels of badassery and monetary investment
>>527160998Make private payphones a thing again.Zoomers will eat that shit up.Charge like $1/min so they too can experience overpriced phone calls and find some hack/workaround just like the good ol days
Brax3
>>527159375Encryption is illegal on amateur bands, so the only thing you can use your baofeng for is transmitting everything you want to say directly to the glowies. And there is an army of boomers with nothing better to do than triangulate your location and tell on you if you break the rules.
>>527159032Wasn’t the guy who developed this a complete schizo?
>>527160426keke could see that in the catalog thumbnail
>>527159032you cant
>>527160214I'm not putting anything with "kosher" in my trust. Nigga are you crazy?
>>527159032Now I thought of an alternative question: let’s say you got your hands on a video or a document that will get you fucking killed if leaked. Say a complete video of Fauci admitting being responsible for the coof in a partyWhat should you do to leak that shit? The only thing I think of is sending it privately to an online admin or something> inb4: nice try FBI
>>527161337Just displace your transmissions in the hills some fat fuck boomers with health problems aren't gonna climb and patrol rugged terrain like this is fucking Afghanistan.
>>527160998>Also, Google and Apple track your location 24/7Well, not entirely. They enable it, but they're more like the people selling the shovels rather than the dirtWhat you really have to watch for now is corps have installed "Free Wifi" in pretty much every publicly accessible building. Sure, they collect your browsing data (or try to) but the real problem is wifi triangulation. They use an array of routers to triangulate the radio on your phone, they've got it pretty down pat and they track where exactly you're standing in the store, and for how long. You don't have to connect to their network, it will work as long as wifi is turned on, it scans passively.This is how the NSA and other security agencies use metadata to track an individuals location and digital footprint, they just query it and bang it's there, local cops have access to cell tower info but not the metadata triangulation versions. You need an uberhigh security clearance for it. They can get everywhere a person has ever been, everything they have ever typed or spoken digitally since ever. Furthermore, it is possible to use wifi in tandem with something called FARSIGHT technology which enables a user to "see" inside buildings with varying degrees of resolution via wifi signals
>>527161431Everyone who gets deep enough into infosec and doesn't work for 'the man' "becomes" schizo, in part, because they start to see the bars of the prison everywhere, and those without their knowledge walk around unconcerned, as if they were completely free. Like, exactly like the movie They Live, but without allies. The other part, could be that they are made that way."The Security Question" has eaten everyone I know who's tried hard enough to answer it. Myself included.
>>527159032do you have prince albert in a can
>>527161753> let’s say you got your hands on a video or a document that will get you fucking killed if leaked>What should you doGenerally the strategy is to hide it in a popular torrent(s) and let it disseminate that wayBy the time anybody knows what it is, it's already been privately shared a gazillion timesThe leak then becomes "Do this, and you find the information"The idea is that many thousands of users already have it, and it becomes a meme to do thisIt's now impossible to get rid of; or at the very least the efforts in doing so would Streisand for ill effect
>>527159032It's the most secure to assume that you can't. If it uses any public networks you carry a device around that is constantly spying on you.Using a smartphone is particularly frivolous. For necessary phone calls a cheap dumb boomerphone is good enough.
>>527161337Yeah that's what they say but I know for a fact that's bullshit. It's like telling a child their face will get stuck that way if the wind changes.
Redpill me on Graphene OS. I'm about to buy a pixel 10 and install it. I like the sandbox features, the kill switch, the fact it's supposedly impervious to the zog's forensic phone downloading thing. Why shouldn't I?
>>527159032Trash it and get a dumb phone
>>527161801Maybe you'll get away with it for a while, but the FCC loves ruining people's lives if they become annoying enough on the airwaves. It's not a practical or scalable solution.And anyway, the key element here is encryption. You don't need to break the law and make yourself a target like this to have securely encrypted communications. The idea is to use open-source tools with strong, audited end-to-end encryption. The government hasn't broken RSA yet (or at least revealed it publicly), and it's still the gold standard for secure communication. With strong encryption, you can use any communication channel you like, and your data will just be bytes among an ocean of bytes. That is what you want.Don't roll your own tools, as any weakness in your implementation can make cryptanalysis against RSA exponentially easier, taking it from infeasible to trivially easy. This was actually one of the tasks on this year's NSA codebreaker challenge. You had to decrypt some RSA-encrypted comms, and it turned out that insecure key generation significantly reduced entropy, so the keys could be cracked in minutes instead of a gorillion years. This is something that they really do... They are fine with collecting terabytes of encrypted data that they can't crack today just in case some new information comes out later that enables them to break the encryption 10 years later. You want your tools to be open source and audited by as many eggheads as possible and proven to be secure.The other thing is to not become interesting enough that they start trying to use side-channel attacks against you, like >>527161118 mentioned, because then you're fucked regardless.Sorry for rambling at you btw, I know you didn't ask, but the info is relevant to the thread.
Don't own one. No one's forcing you.
>>527159032You control the buttons you press.
>>527161431I would be more concerned if he wasnt.I only trust Shizos to build my OS.
>>527162244What's the security question?
>>527162959It gives a lot of trouble to most police forensics aparently because they are used to the low hanging fruit. It really depends on what kind of Israeli software they bought. If its the cheapstuff you are probably safe. Can probably evade most low level glownigger stuff as well. It really depends on the amount of effort worth it to track you. If its good for drug dealers its good enough for me. If you are a terrorist or something like that you are better off masking your signal instead of trying encryption i think.
>>527159032You can’t. That’s the fun part. Maybe look up the Edward Snowden leaks from like 15 years ago. Imagine what they can do now
You can't. The only way to send truly secure messages is through a hand delivered, hand written note. Ideally you burn it after the information has been passed to the intended target.We're soon at the point that we need to think about courier networks to save what is left of our civilization.
Buyba Librem5 or a Liberty Phoneand then never use it
>>527164378get on my level fag
>>527159931Sneed
>>527159032I use a dumb-ish phone that has an outline hardware switch and no front camera. I do banking with my iPad mini at home. I think it's a reasonable compromise. I heard Graphene was releasing hardware, is that true?
>>527159032you cant because the cpu's, the OS and motherboards have backdoors, so good luck making your ownThey can see everything you do and see and much more, both sides want more and more control and surveillance
>>527159032Don't have one to begin with. It comes compromised from the factory.
>>527159886QRD?
>>527161337>>527163169Apropos, what's the deal on those "world phones"? Are they based or nay?
>>527159032throw away your phone in the rubbish bin and use courier pigeons
The most effective way to hide your communications begins with a harsh truth: accept that you are under constant, 24/7 surveillance. You have zero privacy. Every word you speak, every video you watch, every keystroke (including backspaces), every search—it's all recorded, logged, and stored forever.From that starting point, your realistic options shrink dramatically. The best way to communicate now is to invent a private language or code that only you and your trusted associates understand. Other than that you can embed messages using steganography—hiding data inside innocuous-looking memes or images in ways that the "affirmative action" glow niggers can't detect or comprehend.Even buying a so-called "privacy phone" shipped discreetly through the mail offers no real protection. Glow nigger agencies or their contractors can intercept the package en route, tamper with the hardware or firmware, and re-seal it so seamlessly that you never suspect a thing. True privacy becomes impossible because the entire surveillance-industrial complex has monetized every aspect of modern life. It's a tightly integrated system of thought control designed to shape your perceptions, beliefs, and behavior.Your shaped reality, in turn, dictates how the world operates: the rules people follow, how they spend their time, and ultimately what sustains a global industrial slavery machine that funnels productivity and wealth upward to financial capital.Its a profoundly abhorrent system—oppressive, invasive, and accelerating in scope every single day. At this stage, completely unplugging from all devices actually marks you as a bigger red flag than simply owning a smartphone and maintaining social-media profiles. In the end, you're a slave and your data is used to undermine your agency and their goal is the total subjugation and enslavement of the human race to the point that even their thoughts are are in chains all serving the system they call (((our democracy))).
>>527159416>You could revert to a dumb phone with only text and call capability but even those can be listened in on.They stopped selling brand new dumb phones a few years ago. The cheapest brand new phones you can get are all 4G smart phones. Crazy world we live in
>>527161337>Encryption is illegal on amateur bands,In sweden it is against the law to be a criminal
You're going to want to connect it to get the perks of being an American citizen
>>527159032>>527159886What are the pros and cons for both Graphene and Temple?Which is more secure? Which is easier to install? Use?>>527167417
>>527171290You cant install Temple OS without an iPhone
>>527159032take out the battery
>>527159032By not owning a phone. Good luck
>>527159032Dont use one
>>527159032>Only works on Google Pixel>Doesn't work on Samsung because its hardware backdooredwow, imagine buying samsung or apple and then complaining about privacy.
>>527159032any american owned operating system or CPU has a backdoor for western governments. any chinese/north korean owned operating system or CPU has a backdoor for china. pick your poison.>>527171080this. also most "privacy phone" companies are just government sting operations, and you can't know which is which until after the fact.your best bet is just to keep a low profile. governments still cant deal with all the data they are collecting (this will change when AI becomes better), so they prioritize targets that hit some red flag. so you want to keep a low profile. make up phrases that sound innocent to mask your suspicious operations (dont use the word "candy", its become a trope by this point), and dont access suspicious sites/groups without multiple hops of private proxies. and keep your sussy activity to a minimum and mix it with normal activity, and keep your online sussy activity schedule separate from anything sussy you do irl so the timing is random and cant be matched together.
>>527159032I don't think you can.All the companies that make your phone work with gov.Because of AI, it's become really easy to find software bugs. So there's probably a lot of open source libraries that some people know all the issues with.Everything we click on the internet is being retained for some time, and probably in some years the SuperGovAI will be able to watch all of it.
>>527159032ultimately if they want to spy on you then they can and will but Graphene OS is great, greatly diminishes your digital footprint and is a superior operating system, been using it for a few years now and also set up a half dozen other people with it, it's good, go for it
>>527159032there is probably a reason why huawei is banned here
>>527159032Bird is the word
>>527171762This jew is right, be inconspicuous and randomly mix activities.
>>527159032>dont>spam them with dick pics with arabic captions
>>527159032Pgp
>>527171924What makes graphene os better compared to lets say postmarketos?
>>527172656>What makes graphene os better compared to lets say postmarketos?you tell me how whatever the fuck you're talking about is better than GOS
>>527163169>The government hasn't broken RSA yet*Shifts nervously*Uhh, well no, not "broken" pre se, I wouldn't call it thatThere are ways of using exotic math to reduce the keyspace to something that's somewhat approachable for the levels of compute that an entity like NSA has access toIt's actually fucking crazy, they basically hack the universe by trying to compute using parallel universesVery spooky shitThere's also CPU power line/frequency analysis you can do when it executes the decryption routine, there's a way of digging out encrypted keys in RAM this way. Turns out transistors are actually polyrythms and they sing you a song if you know which notes to listen to.>>527171080>The best way to communicate now is to invent a private language or codeA lot of people still use one time pads and PGP-Keys>Even buying a so-called "privacy phone" shipped discreetly through the mail offers no real protectionIt's called interdiction and most people interested in these kinds of purchases are aware that exists>At this stage, completely unplugging from all devices actually marks you as a bigger red flag than simply owning a smartphoneSpeaking of polyrythms, they can convert your bio-signature (it's just loops of loops) and speed it up to generate a unique frequency. There are satellites which and track this frequency. There is literally no escape, you'd have to be 400 feet underground
Graphene OS or whatever software you run is ultimately meaningless because at the true root layer is the firmware running on the Mediatek, Qualcomm or other System-on-a-Chip (SOC) that is operating the core processor of your phone.If you do not control the baseband firmware (and you don't) you do not have full control of the phone, and you cannot prevent glowies and Jews from fucking with you from a higher point of privilege in the device.Baseband firmware backdoors are equivalent to bios backdoors on a PC. It doesn't matter what OS you're using if the spooks are in your bios.The same is true for firmwares in the various other ICs and chipsets that make up a modern smartphone.A backdoor in a battery charge controller module, for example, combined with med with a backdoor in LTE modem firmware, could be exploited by a sophisticated state actor to remotely cause a dangerous fault, short, overcharge and then.... I dunno... *boom*.?
>>527173568I would say its more customizable and supportsore devices
>>527174352More devices*
>>527174352ok, I'll have a look at it but as this postersays>>527174142I'm quite happy with GOS but I'm not trying to evade all surveillance just like leaving less of a trail and having an uncluttered OS
>>527160998>>527159032>>527159161>>5271592235G melts your brain. most people ive seen who keep their head near a 5g phone are quite dumb
>>527174352doesn't look as functional as GOS, which is basically Android that's been degoogled, I run a couple of normie apps in my sandbox which suits me just fine, I will continue to investigate though
>>527174779I almost never use 5g, I keep it turned of and only ever turn it on if I need data while out and about which is rare because I prefer not to be loking at my phone when out in the wild
>>527171290This is the best portable device for TempleOS. It's masterful
>>527175452It doesn't matter what you do. Your phone pings towers even if it's turned off. You lose with any "smart phone", faggot.
>>527175631I am aware of that you fucking mongoloid subhuman
>>527175701Fair enough, nigger.
>>527159032You can't. Best thing you could do is buy an old flip phone. You meta data is still being recorded but it doesn't have a camera or gps built into it. And it isn't connected to google or apple.
>>527164272>Edward Snowden leakshttps://archive.org/details/EFF_-_20131230-appelbaum-nsa_ant_catalog/page/n11/mode/2upI'll just leave this here
>>527173882redpill me on satellite biosignature tracking. what kind of measurements are they taking to generate the frequency? heat signature? or is it something more specialized like spectroscopy? that's gonna require some crazy resolution and noise reduction.
>>527159416Good thing my pinephone is still kicking. Lick my anus faggot.
>>527163169the american government only cares to ruin lives. they all deserve to be shot in the head.you are dead already.
>>527175743I still have the 6600 by Nokia. It's got a low quality camera (1st gen) and only BT and irDA if I remember correctly. Gotta ditch my iPhone in favor of this old boy.
>>527171080>completely unplugging from all devicesThis might mark you as a red flag but they no longer get data from you. Can't be worse. The authorities are reliant on this tech. Unplugging from everything neuters their ability. It's fucking illegal anyway. They should never have been allowed to record all our data.
>>527175757>redpill me on satellite biosignature trackingThe body is an electrochemical fractalized organic computer. Biological processes follow a repeating cycle, a beat if you willHeart rate, respiration, blink rate - these are all beatsSpeed the beats up, you get a polyrythmSpeed the polyrthm up, you get a unique frequencyUse IFFT for time-domain signalsThis becomes a unique bio signature which cannot be emulated; a hash of a humanThis way they can tell where you are and what you're doing by reading the frequenciesUse it in conjunction with a massive neural net and it's like a magic prediction box, an 8 ball one shakes for a reliable answer
>>527161753Just upload it to 4chan and let Anons do the work
>>527159032Just 30 years ago all phones were landline tapped by the government and not only glowie agents could hear you talk, but bored women at telephone stations too. When i was a little kid mother took me to her job, she worked at old mechanical telephone station and machines there had headphone port just in the open so you could tap into any conversation.
>>527176633Wait until he hears about a coordinated SS7 attackWe have the same problem today only except now the wires are accessible to anyone within a 500km radius with the right equipmentMost developed countries have moved away from the type of infrastructure which makes this possible but in Ukraine, I feel these chances are lowIt isn't about decyrpting the traffic, it's about convincing the tower you should have permissions you shouldn't; the tower decrypts the traffic for youCarriers and other service providers which use SS7 as a protocol are likely to be vulnerable by nature of implementation; though there may be workarounds i'm not aware of to mitigate the issue
>>527159032you can'tin fact the moment you connect to a cell tower they know everything about you
>>527177100>in fact the moment you connect to a cell tower they know everything about you>Walk into any 7-11>You get dinged by the security camera>It backs up to a huge data center offsite>Fuck the entire cookie jar, that shit goes straight into the hand>UberAlgos dunk on your smug trudface poorbastarding your way at in 3am to scrimp out a pack of smokes>Algo flags Interpol, eventually some agent midway through a ham sandwich swivels in a spinney chair>PGDN is mashed a great number of times as the agent chews and snorts at your pathetic attempts at anonymity >yah, got our boy he's in fukken Guam>why>uhhh pack of smokes and what looks like one of those big cans of brisk>kay, put him on the list
I have a intruder in my home network.It got onto my phone with graphineos, and it cuts a piece off every drive I stick Inand labels it part of its "comtainer.".It simulates being turned off and sends shir while I'm sleeping or away.Printer, PC, Mac, graphibeos, Motorola, hard drives, router, it even wrote shit onto the fucking DVDRW I burned tails onto as a live boot read only iso, and lives for weeks in RAM or GPU cards.Fucking fucked bros, its over. Probably in my fucking car too.
>>527159032By burning it to ash.Seriously there is no such thing as a secure phone, best you can hope for is that it's friendly-ish types that dominate access to it.
>>527178049Its a VM with remote desktop environment.It has a catalog of every cable and charging block in my house.???Wtf do I do?Is it CIA?
>>527159703Shows some fidgety bidgety, has iphone and apple keyboard on background. Thinks private mode in explorer and no phone is off grid.
>>527161753Buy a bunch of usb drives, get a bunch of tiny little parachutes, and charter a small plane to chuck them out of over a major population center.
>>527171234not buying it. a lot of boomers can only use dumb phones. you can still buy a brand new one here. still, the moment you have a phone on you they can trace your exact location. phone calls and sms can be listened to and read. a little bird told me that when the pope came to visit our country, the police listened in on every single phone call made in a radius of 15km from the capital city. now with ai they dont even need to have a real person listen to it. i heard pagers are still the way to go but what do i know
>>527176194>>527173882>The body is an electrochemical fractalized organic computer. Biological processes follow a repeating cycle, a beat if you will>Speed the polyrthm up, you get a unique frequency>This becomes a unique bio signature which cannot be emulated; >Use it in conjunction with a massive neural net This is actually a good thing, if we take over and use it to build something good. For instance. We can make a digital money system that can be tracked with this. And we can block scammers , fraudsters , thieves >for instance, credit card authentication is difficult >due to credit card thieves and databases of stolen credit card #>if you can identify that a cc belongs to a person, or if it is a thieve in India or Russia, this is a big deal
>>527177474>>Algo flags Interpol, eventually some agent midway through a ham sandwich swivels in a spinney chairWhat is more dangerous is databases of stolen credit cards, in Russia, in India, In Pakistan, in Israel and in Africa (in places like Accra Ghana).If you have a way to identify the credit card transaction is made by cc user, vs. some thieve on another continent through VPNs. Then you just saved bankers and merchants hundreds of BILLIONS of $ stolen. Then a thieve decides to take a vacation to some Egypt or Turkey or Dubai, and it is over as soon as he lands in the airport.
>>527159032The best you can do as a normie is get a pinephone or something similar that has hardware disconnect switches for the cameras, gps, etc, but it will still run on linux which I'm sure has some undisclosed exploits governments have on hand. Otherwise build your own phone from scratch and have it run on something like Temple OS, which is possible but beyond most people.
>>527179158>This is actually a good thing, if we take over and use it to build something goodYeah you could walk though something similar to a metal detector and it could immediately detect, isolate and diagnose pretty much every possible medical condition by examining internal ployrythmic biological functions extrapolated to a frequency distribution and cross referenced with a known "Healthy" signatureMedicine now turns into retuning the body's biorhythms back to a correct frequency, it's kind of a one size fits all universal medical diagnostic system, really>We can make a digital money system that can be tracked with thisI don't think it should be possible to track purchases; that should be *strictly* private and anonymous but they should be able to track sources of incomeThis way nobody has to worry about anything *unless* you have large, illicit income streams. They don't have to verify who bought what, but they should be verifying that it was a real, actual human that made the purchase. This stops a lot of fraud while also maintaining a reasonable umbrella of privacy to the individual>And we can block scammers , fraudsters , thievesYes, there's a lot of good things you could do with a fully digital currency; it can afford the average citizen a good chunk of fair privacy while also holding enough power to nearly erase any credible possibility of any long term criminal profitability. The problem with scamming isn't so much scamming, people are retards and there is an endless supply of them; you can't change that - but what you can do is make it extremely difficult to bring home the bacon at the end of the day. This is why scammers want gift cards - it's pathetic but it's really one of the only ways they can convert their scams to tangible value. Dealing with scams isn't about eliminating them entirely - that's not possible either - it's about raising the both the technical and personal investments so high a scammer just gives up and moves on
>>527159032Put it in a Faraday cage.Pic related, it is a Faraday cage.
>>527180206Fuzzy hands types this
>>527176194okay but you said satellite, how would they track all of that from there? as far as I'm aware that tech barely works if you are even in the same room. as for telling what you are doing, that shit is not currently possible. best you can do is tell if a person is doing physical activity or if they are focused.>cannot be emulatedof course it can. it would just be very hard and expensive. you'd have to know what kind of sensors you are dealing with. if its only based on EM or radiation, it is theoretically trivial to emulate by holding a screen in front of the sensor that emits the right wavelengths per pixel at the right time. if you mix it with a sensor for air pressure of breathing, it would become harder as you'd have to make room for both the screen and some air compressor. but it is solvable.
>>527159032Isn’t Apple a super jewish company that doesn’t let the government hack or unlock your phone or some shit?
>>527160426>>527161455they always have to show you. they can't do anything without telling you the truth in subtle ways. it's how satan works.
>>527180379>how would they track all of that from there?You would need an array to produce an interference pattern which utilizes a type of spectroscopic LIDAR to infer the harmonics of the polyrythms; IFFT is then used to construct the macrosignature>of course it can. it would just be very hard and expensiveWell it would work the same way encryption does, you just keep increasing the resolution of polyrythmic signal depth orders of magnitude until you can tell who's who by listening to the vibrations of their cells dividing. It's similar to multiplying two primes; get the resolution high enough and the compute time to simulate it becomes so high it's unfeasible. I don't know if there's a way of making it quantum-safe but i'm sure there's some creative avenues to approach. There's a whole tiny world in there, it's just hard to explore it without the right spectra. Plus, even if someone was running around with a bio-signature cloner; you could probably detect that fairly easily itself >but it is solvableIndeed
>>527180458>Isn’t Apple a super jewish company that doesn’t let the government hack or unlock your phone or some shit?No at all. They don't want to enable a corporate legal climate where they are swamped by every retarded local LEO looking to get a tip on the Honda Civic that went missing 784 weeks ago by just dumping the entire electronic contents of a user's private information on the floor and rifling through it because it's easy to do so. Apple wants to posture in a way where they are able to comply with highly specific and direct legal requests in exceptional circumstances while also maintaining as low overhead in the legal department as possible. By low, I mean tens of billions of dollars, but it is what it is.Apple has a vetted interest in producing products in ways which are not easy for midwits with access to a screwdriver and qualified immunity to smash open like a cheap piggy bank for reasons to which they elect not to provide. It's bad for business, and it's bad for customers. Apple wants them to go through an extremely refined and developed process in order to obtain subscriber information in only specific circumstances which meet strict legal criteria only after a team of supernerds have carefully squinted at it for an unreasonable length of timeThat's what all the huff with the FED's was about - they were pissed they couldn't just "call Apple" and and provide the encryption keys to unlock subscriber's iPhones. That's why they changed the laws so if you don't provide your password, they can just jail you indefinitely as contempt of court. The FED's had to resort to exhausting the 8 attempts until hardware lockout, then fucking re-soldering a new chip onto the phone to reset the counter and simply try and enumerate 16777216 possible passwords. They got it, eventually but they were fucking pissed about it and tried to sue the shit out of Apple, but Apple's supernerds won
>>527180690This is the dumbest fucking conspiracy out of all of them, even flat earth.
>>527182005
>>527159032Throw it in the trash and learn to live without it.
>>527162244One aspect of the security question is How do you build a permanent 100% secure information storage and communication system that actually still functions when the components of the system are provided by a potential adversary? It ends up being impossible (or temporary) in any situation where your adversary has more resources than you.Another could be, how can you be sure a system you can't understand in totality is secure by any conceivable metric? You can't, not by any rigorous definition of "sure"."The security question" is just my personal oneshot phrase to describe all the security ideals that run up into a paradox or cost infinity time or money in theory or practice.
>>527159032>How can i secure my phone against the government?Do (You) have any idea how stupid this question is?
>>527181078>spectroscopic LIDARspectroscopy measures composition. it will tell you that you are looking at a human, not who it is. any tech that would be sensitive enough to differentiate between the signals of different people is decades away.btw any result of spectroscopy is statistical because readings of one chemical "bleed" into the unique spectra of other chemicals- the more variety and mass you are dealing with, the less accurate the result (unless you are fine with a general result like "this thing has many proteins", which doesn't tell you anything useful if you are not a geologist/astrophysicist). there's a mathematical limit to this method. mixing it with LIDAR eats away at the amount of information you can infer, so the statistical confidence of the result decreases even further.>Well it would work the same way encryption does, you just keep increasing the resolution of polyrythmic signal depth orders of magnitude until you can tell who's who by listening to the vibrations of their cells dividing.you can't do that with living organism, its too varied and dependent on the situation. imagine eating something different for breakfast and suddenly you can't access your bank account
>>527183194>you can't do that with living organism...unless they are NPCs
>>527180458no. Apple has a backdoor, they just don't unlock it for you unless you are the CIA. other agencies have already broken it. Apple also provides all your data to advertisers, the only difference to other companies being that they don't give away an identifying ID, so advertisers have a harder time tracking your data over time. its still possible though, I worked at a company that used AI to do that 6 years ago, so its probably a solved problem by now.
>>527159032Reminder that 99% of nu/pol/ would support the state gunning you down like a dog for doing this
>>527182485>"The security question" is just my personal oneshot phrase to describe all the security ideals that run up into a paradox or cost infinity time or money in theory or practice.And yet the solution is so simple and easy...
>>527183194>spectroscopy measures compositionWell I meant *like* this, not this specifically. I'm not nerdy enough to explain, someone else will have to do that bit, but it will work>it will tell you that you are looking at a human, not who it isThere's enough internal biorythms which are unique to the individual that you could use this to construct a type of biological certificate>btw any result of spectroscopy is statistical ... mixing it with LIDAR eats away at the amount of information you can inferYeah, reading information like this tends to destroy it; the trick here is extrapolation - they already have devices which can track heartbeats through walls, why not package that up into a bundle encompassing the full breadth of biomechanical polyrthmic process; it's like generating a hash>imagine eating something different for breakfast and suddenly you can't access your bank accountThe idea would be that this type of change falls under a fractalized hierarchy so this level of granular detail shouldn't shift the delta of the signature beyond a threshold, but ideally the algorithm would be accurate enough to detect that it was still you, and what you had ate for breakfast but I do see your point regarding the "hashing" issue here. The hash in question has to be fluid and malleable but with coherent integrityThey want to chip the human, I say make the human the chip
>>527183697>Reminder that 99% of nu/pol/ would support the state gunning you down like a dog for doing thisI do support the summary executions of phoneposters desuThey literally deserve to die for carrying a cancer-generator in public and paying for the mass radiation-genocide of entire populations.
>>527159032GrapheneOS is by far the best option available right now. Supposedly it causes real problems for law enforcement.
>>527171234You can buy nokias for 20 quid lad
>>527159032You cannot be online privately, the internet was designed as such, as was the phone system before that.
>>527184140Backdoors on the metal my dude, but yeah when done rightSee >>527178049Fucking cyberniggers
>>527159032When the phone is up and running, it's impossible to secure your phone against a properly funded cop, to say nothing of an entire government. For years there have been exploits where a single text message can install root level stuff on any phone. The one on iPhone was particularly hilarious because it could install so fast that it would cancel the notification of its own text arriving, so you had no idea. These did get patched away when they came to light, but there are probably more just like this. Every time the phone companies advertise something as the most secure, there's always some thing that comes to light later- usually several things. Do you remember how Bezos got pwned by some group that may or may not be the Saudi government? This is what led to his divorce. He had an android and didn't do anything dumb with it, but it had his dick picks and all the messages with his side chick (now his wife). Now obviously you aren't gonna get targeted like he was, but at the time there was literally nothing he could do- except simply assume his phone was compromised.So your phone is compromised, and you should assume that. The only thing that might actually be secure is if you have a long passphrase on your phone and don't enable anything that gets around it (like a fingerprint or a face scanner). If you do this, the only way to unlock it will be the password, which you made unguessable. This isn't practical because your password will be like twenty characters long and even then the phone needs to be off or else the OS inevitably has some way to be cooked if you run a cable to it. Anyway it can't practically be done. You can secure a Linux box, even one with AMD and Intel junk, it is conceivably possible to secure a Mac, and I just don't know about Windows. But that's on PC hardware. Phones are fucked.
>>527178049>>527184513Broadly speaking, malware will not simply spread seamlessly between different devices and flash itself into different firmwares in that way because it's immensely difficult do and every device is different.If you're experiencing that, you've either done something really, really naughty and pissed off the CIA or NSA, or you've stopped taking your meds.
>>527159032Graphene OS actually worked, which is why they're trying to kill it now. There's a phone by Purism in America they're working on that has no backdoored chips in it. But it's still in development.
>>527159032They can explode your phone whenever they want.https://youtu.be/zn5njSpgQyU
>>527184140>GrapheneOS is by far the best option available right now. Supposedly it causes real problems for law enforcementKnow what's causing some real problems right now? The fucking Russians. FIS.They figured out you can use some advanced algorithms to do stego OPs in ways which are impossible to detectA picture is worth a thousand words, but I can tell you that in some cases, it is worth much more that thatIt's not encryption it's chaotic obfuscation to the point of absurdityThey broke the signal to noise problem by converting the signal to noiseIt's all just a honeypot anyways, same with VPN's. Just set up a VPS in a domestic CDIR range, SSH out of a proxychain and bob's your uncle. Bonus points for routing traffic through conflicting countries; India and Pakistan are gud because they will absolutely refuse to share info so if you hop between them neither country will admit it, KEK
>>527185903Steganography and/or the use of VPNs/proxies are really something you would use on top of GrapheneOS. GrapheneOS only really functions as a way of giving you a fully patched Android install with additional security features that hasn't been raped by Google or deliberately backdoored.
>>527159032>1. take phone into bathroom>2. sit on toilet>3. read The Protocols of Zion (or >>527161753) out loud while doing your business>4. be sure to flush when you are finished>5. reminder that employees must wash their hands before returning to work