Login to add a hashtag.
Hashtags
Tags
Bookmark Mark
Topic Internet privacy
Public room public room
Moderators •   multor
Depth •  Tech > Internet privacy
Purpose • 
All and everything concerning internet privacy. Discussion, tips, advice, news.
683
65
2
More
Copy link
Report
Visible to the public Public post
Attachments • images • video webm/mp4 • max size 4096KiB.
Attachments • images • video webm/mp4 • max 4MB.
Filter by  â€¢  Newest
Newest
Sort posts in decending order by date
Oldest
Sort posts in ascending order by date
anon@277 
More
Copy link
Report
In shadows of the net, she seeks her match,
Where Tor's anonymity is a must to catch.
No public eyes, no prying sight,
Only those who let her post in the dark of night. With every click, a secret shared,
Her heart beats fast, her love unimpaired.
In encrypted streams, she finds her way,
To hearts that understand her digital day.
anon@277 
More
Copy link
Report
>>
True. My own solution is, for the most part, forward secrecy. Consider every machine you are using is probably spying on you and your activity, adjust and adapt to that. Like Edward Snowden warned before, if you don't want something known then keep your devices from knowing it, limit the amount of personal information you put into it, use multiple devices to compartmentalize and isolate certain activities making it harder to track everything you do, routinely wipe your web browser session caches/history, etc.

Think of it this way. How is a hacker going to humiliate you if he/she hacks your computer and finds nothing of proof or substantially nothing personal, or of any value, to humiliate you with?
anon@277 
More
Copy link
Report
>>
Older non backdored processors are good indeed. Long term, a viable alternative is needed when these becomes inadequate. I don't have a solution.
anon@277 
More
Copy link
Report
>>
Newer intel processors have WiFi backdoors since at least 2011 from what I recall. This is one reason I store nearly all my files on multiple separate offline drives for security, as well privacy, reasons. Some of them I have in Blackout faraday cage bags. I even have a separate personal laptop used only for personal email in one. Those bags shield devices from WiFi and electromagnetic hacking/eavesdropping as well protect them from an EMP (electromagnetic pulse) attack. Good to have for phones too, if you ever wish to become hard to track.

https://blackoutshield.com
anon@277 
More
Copy link
Report
Also avoid newer processors that have been backdoored. It's very hard to find any reliable information on this though
anon@277 
More
Copy link
Report
>>
There are encrypted satellite phones but they are expensive.

https://sat123.com/
kuma@345 
More
Copy link
Report
>>
It's a phone designed for privacy I found. It any good?
wagner@302 
More
Copy link
Report
>>
I'm not familiar with it, but looks good at first glance. Note this post by anon depvana.com/post/3119 regarding privacy phones in general
kuma@345 
More
Copy link
Report
Librem 5?
anon@277 
More
Copy link
Report
>>
Alright nice
decay@347 
More
Copy link
Report
>>
No, from my understanding it can work offline.
anon@277 
More
Copy link
Report
>>
Good advise, but this will still be dependable on corporate mobile network right?
decay@347 
More
Copy link
Report
>>
Pixel 6 can be had, sealed, for ~$300. You can then install GrapheneOS on it. I haven't used any offline messenger but have read about Briar which looks promising. It can allegedly sync through wi-fi, bluetooth and memory cards.
anon@277 
More
Copy link
Report
>>
Privacy phones are expensive, but I may start a shop to get the prizes down. No off the grid solution i'm aware of, but will look into it
kuma@345 
More
Copy link
Report
Any affordable solutions for private phones?
Also is there any alternative off grid ways to have encrypted communications? Like if someone takes down the cell networks, is there a private alternative?
anon@277 
More
Copy link
Report
>>post3176 
Residential wifi is likely password protected. Other than that it's a great plan. For best privacy this is probably the way.
anon@277 
More
Copy link
Report
How about sitting in the back of a van with a laptop in some random parkinglot, using a wi-fi extender, aiming for some other random distance public networks or nearby residential wifi? Possibly usings an OS like Tails (which auto-spoofs MAC) while doing it?
anon@277 
More
Copy link
Report
>>
Agree, SEW is a very srong privacy measure. The problem is to find an accessible access point. Are you only using public wifi access points with this strategy?
anon@277 
More
Copy link
Report
Whenever you are in doubt, use SEW

SEW stands for:
Someone
Elses
Internet

With a wi-fi extender you (yes, even YOU) can do anything

I think a lot of problems are a lot easier to solve if you try to simplify the issue, you'll need to spoof your mac address as well if you want to really be anonymous, and do not travel to public places, they will track your location via your wifi signals, but wi-fi extenders are basically foolproof for anonymity as far as I am aware, and very easy (and legal) to make
anon@277 
More
Copy link
Report
>>
DEA tapped "burner phones" back in the early 2000s to bust dealers. I'm just glad one anon I knew is still around lol.