If you consider yourself a target of a high risk threat, you should do the below. This will be a repost of a past post. However, I updated this. This list is also far from a complete scope of what you should or could do.

Device / OS security:

- Use the most recent device you possibly can.

- Upgrade your device to the newest generation as soon as possible if you can comfortably afford to.

- Use the latest version of your operating system as soon as possible.

- Use full disk encryption.

- Use a long, secure, unique passphrase for your device. Ensure they are unique between all devices.

- Never leave your devices unattended. Keep in your proximity or in a safe place.

- Turn your device off in a tense situation or when not in use for many hours.

- Do not plug devices into unknown ports or with unknown cables.

- Never download unknown apps or files.

- Uninstall preinstalled applications and disable services you do not use.

- Disable WiFi, Bluetooth, NFC etc. when not in use.

- Use airplane mode and/or take out your SIM card as much as possible to minimise cellular network tracking.

Network / Web browsing:

- Only use encrypted protocols i.e. HTTPS, SSH, SFTP and more. You can enable certain applications like Web Browsers to always use HTTPS. Manually type in the https:// part of the URL.

- Use a VPN or an anonymity network like Tor if you are concerned about web sites knowing your IP address or wish to obscure traffic from the ISP of your connected network. Understand you are shifting trust by moving your traffic into other servers.

- Disable JavaScript just-in-time (JIT) compilation for a significant attack surface reduction. Disabling JS is a massive attack surface reduction, but may cause you to stand out and make web browsing unsustainable.

- Disable web browser features you do not need.

- Use an ad blocker if your browser doesn't have one.

- Use the least amount of extensions as possible.

- Use feed readers.

Communication:

- Communicate only over secure messaging apps.

- Only message people you trust or know.

- Do not open unknown attachments.

- Enable scheduled deletion of messages.

- Remember in a private message your communications are as secure as the least secure person there.

Accounts:

- USE MULTI FACTOR AUTHENTICATION. TOTP is secure, and a hardware MFA like U2F keys are most secure. Avoid SMS or email-based MFA where possible.

- Use unique passwords for accounts.

- Use email aliases or burners. Not everything needs to be attributed to you.

- Lie. If a service isn't required to know about your real world identity, like applying for a passport or deliver a product, then don't use real details.

- Delete accounts you don't use. Make new ones when you need services again.

- Assess whether signing up for something is necessary.

Opsec:

- Search yourself on Google, Bing, Yandex, etc.

- Post more of what you want everyone to know, not what only certain people should know.

- Don't create an incentive for people to try and uncover you or misuse your trust. Be private but not mysterious. Don't be a bad actor people will and target you for.

- AI face search / reverse image search yourself.

- Do not post pictures of interiors or locations unless you want everyone to know you was at the location at some point.

- Opt out of data brokers and public indexes.

- If you know too much or too little about something, it's better not to talk about it at all.

- Decide whether you want fame or you want privacy, and stick to that. Regret is a mental toll that will distract you.

- Use common sense and rationale. Be diligent but do not be paranoid. Growing an obsession over a tiny detail leaves you vulnerable to being distracted by a red herring, attention that could be used to uncover a flaw in your approach.

- Learn to concede. Find the answers sources tell you, not the answers you want to hear. Unless you are a professional, then you are not a reliable source.

- Disassociate with data. Learn to only keep files or other data as long as it is necessary. If they serve no use, delete. If they serve a future use, then back it up and encrypt.

- Remember that you are only as secure as the people you trust. If they do not meet your safety or security requirements, don't enable them to do things that could cause trouble.

GrapheneOS users:

- Toggle on enabling hardening like memory tagging, Dynamic Code Loading restrictions and disabling WebView JIT by default.

- Use a strong diceware passphrase if you are concerned about a sophisticated actor with physical access.

- Use user profiles or private spaces if you need something uniquely compartmented or their own VPN.

- Set automatic reboot time to the lowest time you have comfort with.

- Enable duress password. Make it something easy to trigger but difficult to misfire.

- Use your duress password just before shit hits the fan, not when it already has.

- Use two-factor fingerprint unlock with PIN scrambling. to prevent shoulder surfing your primary passphrase credential to decrypt the device when BFU.

- Use the right USB-C port control setting for you.

- Enable LTE only mode for attack surface reduction if you choose to use the cellular network.

- Use Storage Scopes and Contact Scopes for apps more often.

nostr:nevent1qqsvav3pn4j26k5zrldf90vtpujq5d46s0zjtsh7mnah5xw655kxtnspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgsrqsqqqqqphk6g6e

nostr:nevent1qqsvav3pn4j26k5zrldf90vtpujq5d46s0zjtsh7mnah5xw655kxtnspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgsrqsqqqqqphk6g6e

Reply to this note

Please Login to reply.

Discussion

I have a much simpler technique:

* Do not learn to code

* Own a Nintendo 64

* Threaten to learn to code so you can make highly secure Nintendo 64 apps for encrypted messaging and stuff

* Still do not learn to code, leaving open that the more you're provoked, the faster you'll work

Well if you wanted to be provoked then fucking around with Nintendo products definitely works. I've never seen a company hate their customers more than them. They sent private investigators to stalk an engineer for exploiting his own 3DS.

I have a much more complicated technique:

* Make highly secure apps for the Nintendo 64 to do encrypted messaging and stuff with no vulnerabilities that are really useful against you and other users

How about:

Don't use a device made by a company that was originally funded by grants from US Intel agencies for the purposes of surveillance.

you mean ... no digital device.

if you want to be part of the digital space, you have no other option

-------------------------------------------------

Privacy and Other Related Stuff

-------------------------------------------------

You dont kn0w when the life will put you in danger. Or if it might.

In any case, these instructions are not negligible.

Read it carefully. Knowledge can save your life.

Courtesy by nostr:nprofile1qqstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgspzpmhxue69uhkummnw3ezumt0d5hszrnhwden5te0dehhxtnvdakz7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctcnv0md0

--------------------------------

End of transmission

--------------------------------

nostr:nevent1qqsv8wnp9ye8zw3dflg9fuwrk904sr9jzeccsvp8zpwgmsymp9dqexqpz4mhxue69uhkummnw3ezummcw3ezuer9wchsyg9e3hk5e6h2ypusm09ncv2qq6fqp8f5clueylpgdq66nxm5sxjuygpsgqqqqqqs8kgcuk

Is the baseband separated as a pure modem? If not, your list doesn't matter for ultra high risk threats, does it?

Core guidance. Thank you for taking time to do this.

adding typo:

- Use two-factor fingerprint unlock with PIN scrambling. to prevent shoulder surfing your primary passphrase credential to decrypt the device when BFU.

should be

- Use two-factor fingerprint unlock with PIN scrambling to prevent shoulder surfing your primary credential used to decrypt the device when BFU.

What about anobymous esims. How to handle (or not handle) them correctly.

They're good to pay for cellular network access privately. If someone is concerned about tracking from there then they should use the cellular network as little as they can or not at all. Remove SIM (or turn the eSIM off in settings but not delete) and use Airplane Mode.

No-KYC SIMs don't prevent cellular network related tracking, it just doesn't immediately tie your identity to it. You're still broadcasting a standard set of identifiers like IMSI and IMEI, and unique identifiers to eSIMs like EID number. You could fingerprint a device by certain features being available since feature sets could differentiate between phones and carriers even without them.

Adversaries with access to base stations and network metrics over a long period of time would see something not add up even if identifiers were being rotated... For example when on Data and using the same VPN all the time, connecting to the same groups of stations may suggest a travel schedule or where someone lives. You'd need to behave like a whole new person every single time you did a rotation, which is why we don't suggest utilities or hardware capable of changing some of them. Changing one would immediately ring alarm bells and map you. Proliferating No-KYC SIMs in bulk can also be costly, the best solution is free.

Most of this would be a non-issue if there's no linked identity or if you / your geographic area was not persistently monitored which is not likely. IMEI /EID are a phone identifier so you would need to buy a device privately (secondhand with cash?) to not have an identity link. Major phone stores may correlate identifiers of a phone to their customer.

Certain connections don't go through VPNs on almost all devices like captive portal checkers. Wi-Fi based calls and texts are also another. You can toggle connectivity and other default checks back to Google servers in GrapheneOS to blend in with other Android devices.

Stick to buying from a reputable and ethical seller. Don't buy shit with names like "Encrypted Russian Voice Change Ghost SIM" for 800 dollars. That garbage is a scam sold by sellers that get seized by law enforcement (think EncroChat, SkyECC) because they appeal directly to criminal groups who are gullible. Your money wouldn't just be wasted, it would fund something illicit. No support from us.

Thanks. So deactivating the esim when not in use equals taking out the physical sim card? I guess there is still some tracking going on without Faraday bags, as emergency calls are possible with all phones without sims.

Would you generally recomend to use WiFi over esims? These days one can basically use only WiFi without needing to use the mobile network at call.

And one thing that annoys me. Airplane mode does not kill the WiFi. I want a switch to kill all radio at once and configuring different radio configs precisely fitting my needs similar to profiles.

Airplane Mode closes the hole about tracking without a SIM because emergency call support. Calling the number disables Airplane Mode anyway, so little harm done in keeping it on. As for the airplane mode on all radios, yes, that is the case. We have features to turn them off when one is disconnected after a period of time to reduce attack surface though.

WiFi-only works best because there is much less identifying information and the ones that remain like MAC address are randomized per connection. Cellular networks are highly federated and have tons of parties involved while Wi-Fi mostly limits concerns down to who is operating the network you connect to and their service provider. You trust less parties using WiFi.

Obviously, some networks may force you to identify yourself, use accounts, etc. If I am on a train I can simply just lie, it doesn't even try to prove if an email is legitimate in my case.

I'd really love an option to easily deactivate/hide mobile connection or nfc from the menu when I am not planning to use it for weeks or months.

Maybe it's just a nuance but I feel like that would improve UI in my case.

Happy to have you here. Will donate to your cause and hope to see your own device soon.

How much do you think it'll cost you timewise and moneywise. How can we contribute in a meaningful way outside of donating?

Swipe the top menu all the way down until you see a pencil icon, you can then move the mobile data / airplane mode / NFC buttons out of sight by placing them in the gray area.

GrapheneOS isn't just me. I'm not that significant to the project in comparison nor am I leading anything. I just promote a project I enjoy.

We already have a lot of funding regarding this device, likely we won't be making the device ourselves. This OEM will produce the device, and we will just have official support for the OS there. Could change and nothing is confirmed yet.