Replying to Avatar Ava

I spent an inordinate amount of time this week (literally hours watching YouTube reviews and reading reviews) researching phone cases and glass screen protectors for my new Pixel 9 Pro XL.

I really wish more case manufacturers would focus on enhancing the phone's design rather than changing it. IMO, most cases take a $1500 sleekly designed phone and make it look cheap.

Anyway, here were my requirements:

Glass Screen Protector:

- Easy to install with alignment tool

- Drop test protection

- Scratch resistant (9H hardness)

- High optical clarity

- Minimal/no rainbowing effect with polarized lenses

- Precise cutouts

- Full coverage without camera cutout

- Case compatibility

- Front and back camera coverage

- Minimal to no impact on photo/video quality

- Does not affect fingerprint recognition

- Does not affect swipe/gesture functionality

- Oleophobic coating for smudge resistance

- Reasonable cost

Case:

- Minimalist design

- Slim profile with solid drop protection

- Raised corner lips for screen protection

- Raised lip rear camera protection

- Responsive, clicky buttons

- Unimpeded swipe functionality

- Easy port access

- Precise cutouts

- Minimal dust collection points

- Balanced grip (not too slick/rough)

- Fingerprint-resistant

- Lightweight and compact

- MagSafe compatibility (bonus)

- Microfiber interior (preferred)

- Design enhancement, not detraction

- Full NFC and Qi2 charging compatibility

- Heat dissipation

- Reasonable cost

After extensive research, I settled on Spigen for both:

Case: Spigen Tough Armor (Matte Black)

Cost: $15.99 (on sale)

- Pros: Meets most requirements

- Compromises: No MagSafe, lacks microfiber interior

Screen Protection: Spigen Glass Protectors (front and back)

Cost: 18.99 + $14.99

- Spigen Camera Lens Protector [GlasTR EZ FIT Optik]

- Spigen Tempered Glass Screen Protector [GlasTR EZ FIT]

- Pros: Meets all requirements, includes applicator and spare protector

- Compromises: May not match Zagg's drop protection, might cause some blurring with telephoto lens (will test)

Total cost (before tax): $49.97

While this combination might not be everyone's ideal choice, I feel it is a well-researched balance of protection, functionality, and design. I'll let you know how the real world test goes when they arrive. Hope this helps others in their search for a reasonably solid Pixel 9 Pro XL protection setup at a reasonable price.

#IKITAO #Tech #Pixel #Protection

Do you use graphene OS?

Reply to this note

Please Login to reply.

Discussion

Yes, I use GrapheneOS on one of my devices—and have used it as my daily driver for years—but recently moved away from it as my primary phone. My threat model allows for maintaining a front-facing web identity (which is often less suspicious in today's digital landscape). My main device (Pixel 9 Pro XL) now runs stock Pixel OS because it was built from the hardware up to enhance Gemini integration and productivity features.

I keep GrapheneOS (which is best in class at what it does) on a separate, more locked-down phone for specialized use cases requiring enhanced privacy and security. This privacy through isolation and compartmentalization approach lets me maintain both a public presence and private operations while keeping them properly isolated, rather than compromising by trying to make one device do everything.

So you want the botnet to play with spyware Gemini? My Pixel 9 Pro works great with GrapheneOS

She, or he (i can't honestly tell) ngmi

90% Chance a tranny or Jew that thinks the world is out to get them

When in doupt, it's always a tranny

"Privacy Advocate" using Google spyware OS and Google AI and pooping out non sense reasons to justify why... ngmi

You clearly don't understand the concept of threat model or privacy and security through isolation and compartmentalization.

Even Snowden said he's no longer as hardcore because he doesn't have to be. His threat model has changed since he was running from the government. His role is now more that of an educator. The problem with most privacy educators is that they think everyone has the same threat model—the MOST EXTREME.

Good OPSEC is principle-based. It's all about YOUR specific threat model. There are basic practices, yes, but most people are not running from the government (which is very hard to sustain for any extended period of time).

Most people don't need to go full-on ghost or have the most extreme threat model. If you sacrifice too much convenience when it's not necessary, you will burn out.

You have to take inventory and decide in what areas of your life it is more important for you to sacrifice convenience for extra privacy and security, and to what degree.

"mY thrEat modEl is usiNg Google OS and Google AI"

PRIVACY ADVOCATE btw

Says the man who thinks he is super private crypro which uses a transparent blockchain and who hates Monero. That's the one who calls himself privacy guy, cypherpunk etc. And that's the one who uses custodial solutions to receive same SATs 😉

LOL nice selfie from you

Don’t feed the troll 🧌

Live changes, re-valuating the practices is part of adapting to these changes. I'm a big fan of isolation and compartmentalization using multiple devices. This made so many things easier and simpler in the past, but now that I'm travelling a lot, that does not work anymore.

theres legit reasons to maintain a public-facing KYCed identity

if you're completely dark it raises questions.

That's why I keep a Gmail too.

Every now and then I Google search random shit. Or I'll Google jury nullification so they don't ask me for jury duty.

But that's about it. Keep em off ya back

true…but still not a fan of KYC

for sure

I think dual phones is fine tbh

Why would Gemini even matter for anything on this conversation? Is it really indispensável?

It's a fun experiment. Conversational AI assistants are an improvement in UX.

waiting for the selfhosted open source AI that interacts with the internet for me

no need to wait

https://openwebui.com/

oh JFC 😂

Like a librarian or more like a lawyer?

Thus is the question.

yeah.

damn.

that's a whole can of worms right there ain't it?

It is 🙏

was thinking librarian

mostly because of the trust issues I suppose.

A wild GPT4all surfaces: https://gpt4all.io/

It isn't super great, but it is free, open source and works minimally OK without internet access.

Reminds me of Google eclipsing Yahoo because PageRank was so much better. From my perspecrive as the user, I've just been **searching** the whole time

I wonder if Graphene can or will facilitate local self-hosted AI assistants.

As a complete noob, i would ruin my privacy pretty quickly if I tried to use a privacy phone as my main phone

GrapheneOS security features and privacy defaults are solid, and that makes pretty good privacy pretty much a no-brainer out of the box, but I hear you—no privacy tool can save anyone from bad OPSEC.

Is there still a point in switching to graphene OS if you are going to be using GPS and connecting to your email and social media and stuff from it? I currently have an iPhone by the way

I used to be an Apple girl. iPhone is generally considered more private out of the box than Google Android—if you trust Apple. This recent Siri spying debacle is a good case in point of why you may not.

GrapheneOS is more private than either, with not many tradeoffs in usability. I recommend GrapheneOS; it's best in class at what it does, but there are some inconveniences to using it. Not many, but there are some features you may miss, like facial unlock, Apple Pay, or Google Pay, and AI integration (everything is sandboxed), etc. This sandboxing treats Google like any other app and isolates it from being as invasive as it is on stock (even with turning off location data and hardening your privacy using their settings).

However, if you are still uploading all your data to Google or Apple, who scan email and photos and collect a ton of behavioral data, then GrapheneOS can do nothing about that. It protects a lot through its approach of greater privacy and security through isolation, compartmentalization, and on-device security. If you use these big tech services, then you must be diligent about what data you allow them to have access to.

Even if you host your own email, it's likely that the recipient does not, and that becomes a point of failure unless you use PGP (which is really a privacy band-aid since email was never meant to be a secure form of communication), or better yet, an E2EE messenger like SimpleX over Tor/Orbot. However, there are times when email is necessary, so you must be mindful of what data you're sending over unencrypted channels and to whom.

I only use the phone app or SMS messenger on my phone if I absolutely have to. The Snowden leaks proved that the U.S. government has been spying on its own population through backdoors to social media and through unencrypted communication channels like SMS and phone. All encryption is not created equal and some implementations have security holes.

I use Signal/Molly (hardened Signal fork) for normie conversations (kids, mom, etc.).

I use SimpleX for more sensitive matters.

I speak in person in private locations whenever possible for the most sensitive matters.

It all depends on your threat model. Your devices can be found through satellite and signals triangulation unless you keep them in a Faraday bag and never connect them to your home network—even then, if you turn them on when you're outside, you can be tracked and doxxed through behavioral data like work address, friends' addresses, frequented locations, etc.

I recommend a second device paired with good OPSEC for this, and a complete burner purchased by someone not connected with you in cash for a bug-out device. If you make the purchase, wear a privacy mask, pay in cash, buy a prepaid card (use decoy info to activate), or silent link eSIM paid with Monero over Tor using a device that has never connected to your home Internet for maximum anonymity—don't park in the parking lot (they have tag and RFID scanners that ID anyone who parks or drives through there).

You have to decide what's best for your threat model. Do you really need to be a ghost? Does your threat model in this area of your life include government or just big tech? Are you evading an abusive ex? Are you a well-known person avoiding being tracked by media and paparazzi? etc.

Privacy is always a trade-off with convenience. The more privacy you need, the less convenience you will have. In some areas of your life, you may need greater privacy, like private messaging; in others, you may want more convenience. In the end, all you can do is try to slow someone down by compartmentalizing and protecting your data with multiple encrypted layers and red herrings. That said, given the right reasons, enough time and money, and most anyone can be found.

If you want ultimate privacy, never use the Internet; never walk out of the house without a mask (due to Ring cameras and public surveillance); don't open any accounts in your name; don't own anything in your name, etc. Even then, for example, if you are in the vicinity of someone with a live mic or have to make a phone call to a company, chances are, your voice and current locale can be fingerprinted.

That said, it is possible for most people to disappear from most anyone save for gov entities for extended periods of time, but it is extraordinarily inconvenient and not having a front-facing digital identity is oftentimes more suspicious than having one, even if it is just there to reduce suspicion. I recommend Michael Bazzell's IntelTechniques books and training as a very good introduction to privacy and OSINT if you want to learn more.

Regarding OSINT: if you have a bank account or a phone number (VoIP/Jabber numbers are frequently blocked by financial services), a car in your name, a KYC account somewhere, a rental agreement, a mortgage, a driver's license, a passport, a public record, a brick and mortar business you work at or own etc. etc., then you can be found. I have tools and the skills to find most anyone just with open source, freely available to anyone data, and I know where to go if I cannot. For example, did you know there are states in the U.S. where tag registrations are considered public information, and in the states where they're not, it doesn't cost much to have a licensed PI run a tag?

There is even a new form of police scanning device that can read RFID signals from your car tag, your phone, your pet's microchip, even your library books—creating a unique fingerprint to ID you even if it's not your car. This device can scan and record all of this data from a distance while you're driving down the road.

Wifi signals can be used to map out a house, and the location of people inside it. There are so many ways that people can be IDed.

My advice is to know your threat model, and in what areas of your life you require more privacy and are willing to sacrifice convenience, learn and practice good OPSEC, and act accordingly.

#IKITAO #Privacy

RFIDs have very limited power and range. How on earth can they be scanned while you are driving down the road by someone roadside?

Thanks. Scary AF. Time to buy more Faraday bags.

A really good reading, thanks for sharing :)!

I'm hooked. Been wondering about learning better opsec /osint myself. I feel like the knowledge would be beneficial in just about any arena

Actually nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka not to sound too stupid but I'm curious if you know of any GenAi applications that help OSINT or even Opsec? Tools are one thing. Suites of tools are another.

Good thing I sleep in a lead lined casket at night

And the free gov phones... What could go wrong?

If you buy something to hide from the fuzz, don’t be shocked when it turns out they’re the ones who sold it to you.

Whoa.. that's awesome. Been wondering if I should use Graphene OS or not. Have you tried Calyx OS by any chance? Please let us know

CalyxOS is fine for some; I recommend GrapheneOS as a primary or secondary device—it's best in class.

Great advice :)

At least spend your money privately, after a round of https://coinjoin.nl

GPS is reading signals from satellite not broadcast so only danger is general location gathering danger for all phones, even to some degree dumb phones from cell tower interaction. GrapheneOS blocks a lot of google phoning home with location stuff. The social media stuff, especially Meta products which spy the most, should not be used if you care much about privacy, especially not Facebook, or using same FB idea on their other projects. You could perhaps use it in a profile but I would be very surprised if it didn't at least associate phone IMEI with the data Meta normally collects.

Never thought that i will be at a point of being this suspicious, but i am.

I bought 2 Bittium Though Pro phones, that are like your GrapheneOS more locked-down phone for specialized use cases. Running its own OS and no google stuff at all on it.

https://www.bittium.com/defense-security/secure-smartphones-for-professionals/

Nice. I will look into it. Is their OS open source?

I can not tell, never checked that, i just wanted to have 2 phones (one for my better half) that are doing what they need to do.

The biggest advantage for me is the one-touch privacy mode.

No tracking, no camera, no micro.

I'd love to learn what your setup is for front facing phone. What services/apps Do you allow? You obviously don't have to disclose but I'm interested in learning what to consider. Do you expect the usage of Graphene will be minimal now?

Ask nostr:nprofile1qqsps0ccsp6dzr8pzuhq08uuxq40cee4m5k20qk0tqmangkd94xld8spz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9rhwvaz7te3xgmjuvpwxqhrzw358qmrjtcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtckegh2z Graphene OS!