Do you use graphene OS?
Discussion
Yes, I use GrapheneOS on one of my devices—and have used it as my daily driver for years—but recently moved away from it as my primary phone. My threat model allows for maintaining a front-facing web identity (which is often less suspicious in today's digital landscape). My main device (Pixel 9 Pro XL) now runs stock Pixel OS because it was built from the hardware up to enhance Gemini integration and productivity features.
I keep GrapheneOS (which is best in class at what it does) on a separate, more locked-down phone for specialized use cases requiring enhanced privacy and security. This privacy through isolation and compartmentalization approach lets me maintain both a public presence and private operations while keeping them properly isolated, rather than compromising by trying to make one device do everything.
"Privacy Advocate" using Google spyware OS and Google AI and pooping out non sense reasons to justify why... ngmi
You clearly don't understand the concept of threat model or privacy and security through isolation and compartmentalization.
Even Snowden said he's no longer as hardcore because he doesn't have to be. His threat model has changed since he was running from the government. His role is now more that of an educator. The problem with most privacy educators is that they think everyone has the same threat model—the MOST EXTREME.
Good OPSEC is principle-based. It's all about YOUR specific threat model. There are basic practices, yes, but most people are not running from the government (which is very hard to sustain for any extended period of time).
Most people don't need to go full-on ghost or have the most extreme threat model. If you sacrifice too much convenience when it's not necessary, you will burn out.
You have to take inventory and decide in what areas of your life it is more important for you to sacrifice convenience for extra privacy and security, and to what degree.
"mY thrEat modEl is usiNg Google OS and Google AI"
PRIVACY ADVOCATE btw

Don’t feed the troll 🧌
Live changes, re-valuating the practices is part of adapting to these changes. I'm a big fan of isolation and compartmentalization using multiple devices. This made so many things easier and simpler in the past, but now that I'm travelling a lot, that does not work anymore.
theres legit reasons to maintain a public-facing KYCed identity
if you're completely dark it raises questions.
I think dual phones is fine tbh
Why would Gemini even matter for anything on this conversation? Is it really indispensável?
It's a fun experiment. Conversational AI assistants are an improvement in UX.
waiting for the selfhosted open source AI that interacts with the internet for me
no need to wait
oh JFC 😂
A wild GPT4all surfaces: https://gpt4all.io/
It isn't super great, but it is free, open source and works minimally OK without internet access.
Reminds me of Google eclipsing Yahoo because PageRank was so much better. From my perspecrive as the user, I've just been **searching** the whole time
I wonder if Graphene can or will facilitate local self-hosted AI assistants.
As a complete noob, i would ruin my privacy pretty quickly if I tried to use a privacy phone as my main phone
GrapheneOS security features and privacy defaults are solid, and that makes pretty good privacy pretty much a no-brainer out of the box, but I hear you—no privacy tool can save anyone from bad OPSEC.
Is there still a point in switching to graphene OS if you are going to be using GPS and connecting to your email and social media and stuff from it? I currently have an iPhone by the way
I used to be an Apple girl. iPhone is generally considered more private out of the box than Google Android—if you trust Apple. This recent Siri spying debacle is a good case in point of why you may not.
GrapheneOS is more private than either, with not many tradeoffs in usability. I recommend GrapheneOS; it's best in class at what it does, but there are some inconveniences to using it. Not many, but there are some features you may miss, like facial unlock, Apple Pay, or Google Pay, and AI integration (everything is sandboxed), etc. This sandboxing treats Google like any other app and isolates it from being as invasive as it is on stock (even with turning off location data and hardening your privacy using their settings).
However, if you are still uploading all your data to Google or Apple, who scan email and photos and collect a ton of behavioral data, then GrapheneOS can do nothing about that. It protects a lot through its approach of greater privacy and security through isolation, compartmentalization, and on-device security. If you use these big tech services, then you must be diligent about what data you allow them to have access to.
Even if you host your own email, it's likely that the recipient does not, and that becomes a point of failure unless you use PGP (which is really a privacy band-aid since email was never meant to be a secure form of communication), or better yet, an E2EE messenger like SimpleX over Tor/Orbot. However, there are times when email is necessary, so you must be mindful of what data you're sending over unencrypted channels and to whom.
I only use the phone app or SMS messenger on my phone if I absolutely have to. The Snowden leaks proved that the U.S. government has been spying on its own population through backdoors to social media and through unencrypted communication channels like SMS and phone. All encryption is not created equal and some implementations have security holes.
I use Signal/Molly (hardened Signal fork) for normie conversations (kids, mom, etc.).
I use SimpleX for more sensitive matters.
I speak in person in private locations whenever possible for the most sensitive matters.
It all depends on your threat model. Your devices can be found through satellite and signals triangulation unless you keep them in a Faraday bag and never connect them to your home network—even then, if you turn them on when you're outside, you can be tracked and doxxed through behavioral data like work address, friends' addresses, frequented locations, etc.
I recommend a second device paired with good OPSEC for this, and a complete burner purchased by someone not connected with you in cash for a bug-out device. If you make the purchase, wear a privacy mask, pay in cash, buy a prepaid card (use decoy info to activate), or silent link eSIM paid with Monero over Tor using a device that has never connected to your home Internet for maximum anonymity—don't park in the parking lot (they have tag and RFID scanners that ID anyone who parks or drives through there).
You have to decide what's best for your threat model. Do you really need to be a ghost? Does your threat model in this area of your life include government or just big tech? Are you evading an abusive ex? Are you a well-known person avoiding being tracked by media and paparazzi? etc.
Privacy is always a trade-off with convenience. The more privacy you need, the less convenience you will have. In some areas of your life, you may need greater privacy, like private messaging; in others, you may want more convenience. In the end, all you can do is try to slow someone down by compartmentalizing and protecting your data with multiple encrypted layers and red herrings. That said, given the right reasons, enough time and money, and most anyone can be found.
If you want ultimate privacy, never use the Internet; never walk out of the house without a mask (due to Ring cameras and public surveillance); don't open any accounts in your name; don't own anything in your name, etc. Even then, for example, if you are in the vicinity of someone with a live mic or have to make a phone call to a company, chances are, your voice and current locale can be fingerprinted.
That said, it is possible for most people to disappear from most anyone save for gov entities for extended periods of time, but it is extraordinarily inconvenient and not having a front-facing digital identity is oftentimes more suspicious than having one, even if it is just there to reduce suspicion. I recommend Michael Bazzell's IntelTechniques books and training as a very good introduction to privacy and OSINT if you want to learn more.
Regarding OSINT: if you have a bank account or a phone number (VoIP/Jabber numbers are frequently blocked by financial services), a car in your name, a KYC account somewhere, a rental agreement, a mortgage, a driver's license, a passport, a public record, a brick and mortar business you work at or own etc. etc., then you can be found. I have tools and the skills to find most anyone just with open source, freely available to anyone data, and I know where to go if I cannot. For example, did you know there are states in the U.S. where tag registrations are considered public information, and in the states where they're not, it doesn't cost much to have a licensed PI run a tag?
There is even a new form of police scanning device that can read RFID signals from your car tag, your phone, your pet's microchip, even your library books—creating a unique fingerprint to ID you even if it's not your car. This device can scan and record all of this data from a distance while you're driving down the road.
Wifi signals can be used to map out a house, and the location of people inside it. There are so many ways that people can be IDed.
My advice is to know your threat model, and in what areas of your life you require more privacy and are willing to sacrifice convenience, learn and practice good OPSEC, and act accordingly.
#IKITAO #Privacy
RFIDs have very limited power and range. How on earth can they be scanned while you are driving down the road by someone roadside?
Thanks. Scary AF. Time to buy more Faraday bags.
A really good reading, thanks for sharing :)!
I'm hooked. Been wondering about learning better opsec /osint myself. I feel like the knowledge would be beneficial in just about any arena
Actually nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka not to sound too stupid but I'm curious if you know of any GenAi applications that help OSINT or even Opsec? Tools are one thing. Suites of tools are another.
Whoa.. that's awesome. Been wondering if I should use Graphene OS or not. Have you tried Calyx OS by any chance? Please let us know
CalyxOS is fine for some; I recommend GrapheneOS as a primary or secondary device—it's best in class.
Great advice :)
At least spend your money privately, after a round of https://coinjoin.nl
GPS is reading signals from satellite not broadcast so only danger is general location gathering danger for all phones, even to some degree dumb phones from cell tower interaction. GrapheneOS blocks a lot of google phoning home with location stuff. The social media stuff, especially Meta products which spy the most, should not be used if you care much about privacy, especially not Facebook, or using same FB idea on their other projects. You could perhaps use it in a profile but I would be very surprised if it didn't at least associate phone IMEI with the data Meta normally collects.
Never thought that i will be at a point of being this suspicious, but i am.
I bought 2 Bittium Though Pro phones, that are like your GrapheneOS more locked-down phone for specialized use cases. Running its own OS and no google stuff at all on it.
https://www.bittium.com/defense-security/secure-smartphones-for-professionals/
I'd love to learn what your setup is for front facing phone. What services/apps Do you allow? You obviously don't have to disclose but I'm interested in learning what to consider. Do you expect the usage of Graphene will be minimal now?
Ask nostr:nprofile1qqsps0ccsp6dzr8pzuhq08uuxq40cee4m5k20qk0tqmangkd94xld8spz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9rhwvaz7te3xgmjuvpwxqhrzw358qmrjtcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtckegh2z Graphene OS!






