Author

Topic: Using Phones with No-SIM Cards and Other Privacy Experiments (Read 137 times)

member
Activity: 416
Merit: 30
The time is not away when phones without sim will be introduced & available. Different companies are working on it. It is hoped that these phones have special codes or cell no for specific users about they consider legalized and registered. I think sim will be planted in them in the form of IC or LSI. As sound card VGA card, ID card and MODEM card,
, etc. were planted on the main board of computer but they used separately used before 1980 to 1990. Technology is improving and developing swiftly.No thing is impossible in the future regarding the flow of advanced technology.
legendary
Activity: 3276
Merit: 2442
Phones are spying devices everybody knows that already. If you buy from China, CCP spies on you. If you get Iphones, you give your information to the Joe's Demrat crew.

Siri goes on when you say "Hey siri" which means the mic of the phone is always on. They tell you that you can switch it off and people actually believe them just like how they believe W.H.O. because people are sheepl.
full member
Activity: 798
Merit: 104
🎄 Allah is The Best Planner 🥀
I am not saying that it is completely safe to use a SIM card but people can monitor the phone without a SIM card through Pegasus (spyware). With Pegasus (spyware) it is possible to monitor any phone even if your phone is off, Since it is possible to spy on any phone through Pegasus (spyware) on any phone without a SIM card, the SIM card does not seem so important to me.
full member
Activity: 1498
Merit: 146
Then how we use them to make phone calls?

It will be better if we use the old age cellular phone which is actually used only for the calling and other small tasks to get the highest security and privacy.
legendary
Activity: 4690
Merit: 1276

I guess the point is to talk with my neighborhood, and share files, etc., over the computer without the Internet. This for an added chunk of privacy, yet the complexity and power of a computer. Possibly where you live you don't have friends and neighbors who are as deeply into a local group that would share like this.


True.  If I did, it would not be at all difficult to set up a local network.

A use-case which is of primary interest to me is communication between domain specialists around the world about sensitive topics.  Such people may be of intense interest to those players who have corp/gov state level access to a variety of zero-day and hardware backdoor options.

I'm also looking forward to changes in the internet where we might see 'internet driver's licenses' and that sort of thing.

legendary
Activity: 3906
Merit: 1373
What do you think about PirateBox? - https://piratebox.cc/development:git_repositories.

To be quite honest, not much.  Honestly, I'm struggling to see the point of it to a large degree.  From the marketing, it seems like a fileshare with logs > /dev/null and some social-justice sauce spread on the outside.

I hate to be negative, but it seems like it targets problems which are pretty much 180 degrees from the one which interest me.  Actually, it looks like a solution in search of a problem.

I could see a use for this thing if it were acting as a full node for BTC transactions (and other DCC stuff), and it probably could be if someone wanted.  Even here, though, I don't think I would trust such a node even if I did have full confidence that the operator was a good guy.



I guess the point is to talk with my neighborhood, and share files, etc., over the computer without the Internet. This for an added chunk of privacy, yet the complexity and power of a computer. Possibly where you live you don't have friends and neighbors who are as deeply into a local group that would share like this.

Cool
legendary
Activity: 4690
Merit: 1276
What do you think about PirateBox? - https://piratebox.cc/development:git_repositories.

To be quite honest, not much.  Honestly, I'm struggling to see the point of it to a large degree.  From the marketing, it seems like a fileshare with logs > /dev/null and some social-justice sauce spread on the outside.

I hate to be negative, but it seems like it targets problems which are pretty much 180 degrees from the one which interest me.  Actually, it looks like a solution in search of a problem.

I could see a use for this thing if it were acting as a full node for BTC transactions (and other DCC stuff), and it probably could be if someone wanted.  Even here, though, I don't think I would trust such a node even if I did have full confidence that the operator was a good guy.

legendary
Activity: 3906
Merit: 1373
legendary
Activity: 4690
Merit: 1276
...

Any back door would have to be pretty localized without the sim, wouldn't it?

What can we do to get computer to computer Internet without connecting directly to the Internet... except a base station now and again, here and there. Maybe we could have local Net without the Internet.


The back-doors I'm concerned about are sister processors with access to memory and peripheral buses and such.  This would include the 'management engines' built into x86 chipsets and baseband processors on mobile ARM based SBCs.  Another class would be undocumented instructions in processors.  I'm hopeful that the open license model of the RISC-V processors will ultimately foster fabs which can be audited and more trusted.

The above are concerns for those who are more worried about state level spying although it's only a matter of time before backdoors which were initially available to corp/gov state actors are leaked such as what happened with Intel ME stuff.  Anyway, to your question about 'connecting directly', it is relevant to the above in that secret triggers tend to open the back-doors and indirect access can interfere with such things perhaps, but in general it's not really a very meaningful concept.  Most things are not 'connecting directly', but directly enough to a problematic source (an IMSI catcher, say) that some satisfactory firewall-ing could help.  

I do think that 'we' will 'lose the internet' as we get farther into the Great Culling.  Not that it won't exist since it is to critical to vaporize, but it won't be available in un-curated form to Joe Sixpack.  Finding information about the covaids will not be as easy as avoiding Jewtube in favor of Buttchute for instance...but the actual porn-pipe will still be there.  Thus, I think it valuable to explore alternate methods such as some of the mesh network stuff, and also methods of using porn-pipe infrastructure they provide us in a non-obvious way.

I would say also that streaming protocols are relatively easy to censor.  Store-and-forward protocols (smtp, uucp, etc) are going to be much more difficult.  Similar principle applies to large amounts of data vs. tiny amounts.  Bitcoin has two things to it's favor here just FWIW.

Lastly, while IoT may be 'of the devil', it has brought about some interesting things such as spread-spectrum low power radio stuff (e.g., LoRa) which can be usable for point-to-point communications and meshes.  I really like the 'modular' nature of things like this:

  http://www.blakrpi.com/index.php/blak_rpi-for-system-admins/

Any low production and/or roll-your-own solution, even if relatively poorly implemented, is going to be hardened to a degree simply because there are not enough resource to analyze and attack every target.  Just the very existence of such thing will sap the resources of the adversary.  Maybe the BCM2835 processor of a Pi Zero is found to be subverted?  Probably can swap out with another SBC should such a thing happen.  Obviously such a device has dismal performance and zero appeal to most people, but that's not who it's going to do anything for anyway.

legendary
Activity: 3906
Merit: 1373

Ironically, I happened to watch that very video within the last 12 hours, but only half-watched because I was doing other work simultaneously.

I've watched a fair bit of Braxman's stuff recently.  He has mentioned in other vids that without a sim the baseband processor is out of action.  I'd have to get verification that that is 100% true.  One way or another, one is still using Android (or some equally questionable OS), and on hardware which is also almost certain to be back-door'd.

I think the basic rationale about the sim being in an independent advice is good, and a quick-n-easy first step.  I used a pretty fancy pocket wi-fi with an ethernet port back in the old-normal days when I used to travel, but mostly for my laptop.  Even just putting a different phone in hotspot mode could serve the same effect.



Any back door would have to be pretty localized without the sim, wouldn't it?

What can we do to get computer to computer Internet without connecting directly to the Internet... except a base station now and again, here and there. Maybe we could have local Net without the Internet.

Cool
legendary
Activity: 4690
Merit: 1276

Ironically, I happened to watch that very video within the last 12 hours, but only half-watched because I was doing other work simultaneously.

I've watched a fair bit of Braxman's stuff recently.  He has mentioned in other vids that without a sim the baseband processor is out of action.  I'd have to get verification that that is 100% true.  One way or another, one is still using Android (or some equally questionable OS), and on hardware which is also almost certain to be back-door'd.

I think the basic rationale about the sim being in an independent advice is good, and a quick-n-easy first step.  I used a pretty fancy pocket wi-fi with an ethernet port back in the old-normal days when I used to travel, but mostly for my laptop.  Even just putting a different phone in hotspot mode could serve the same effect.

sr. member
Activity: 1316
Merit: 254
United Crowd
I as an common person feel that privacy is not so important.  the most important thing is that my account is not hijacked.  because I know that every activity we use that uses a simcard is actually always monitored by the provider, even though my privacy is not 100% safe but I'm sure they won't abuse it, I can sue them if they are wrong.  all of these oversights have a positive impact on the handling of cyber crime.
member
Activity: 868
Merit: 38
Join hands and help me to grow everybody...
I might say that the technology them benefit people than this present technology of handset, it's rall before you see a handset working without sim card like telephone kind of communication, because this phone sim card is really consuming money from people through recharge card, is any other means that we can communicate without Sim card or recharging frequently.
legendary
Activity: 3906
Merit: 1373
Way back when cell phones came out, you could use them in ways similar to walkie talkies.


Using Phones with No-SIM Cards and Other Privacy Experiments



This will result in several privacy and security benefits. We will discuss the advantages and disadvantages of using a De-Googled phone without a SIM card, an LTE Modem/Router, a VoIP Hardware solution, and a VPN router.


Using Phones with No-SIM Cards and Other Privacy Experiments

https://www.youtube.com/watch?v=qhzU0NHIBrc



Cool
Jump to: