Avatar
SimplifiedPrivacy.com
ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa
Give me Liberty, or Give me Death. HydraVeil is our Revolutionary New Linux app that allows you to create different isolated profiles, to resist AI Browser Fingerprinting from Cloudflare & Big Tech. Another feature of HydraVeil is routing your traffic though your choice of WireGuard or a Tor->Socks5 proxy (to evade Tor blocks), and to fool CDN packet speed tracing with different IPs for each profile. Additionally, we provide VPN service for Android, iPhone, Windows, Mac, and Routers. Tune in to our Podcast to combat Big Tech surveillance. Help me, help you. Hashtags: #Cypherpunk, Open source, #Linux, DeGoogled Phones, self-hosted services, #Monero, #Security, and more!

The find my phone is on the 9, but it needs a Google account to work. It could be a backdoor, but so could anything like the mics. My point was NOT that the 9 is compromised, but more-so that these less expensive models would be great gifts to on-board people to freedom tech and privacy.

OH SHIT!

Bitcoin 71.42k

XMR 165.29

What good is GrapheneOS if the person you're texting on Signal is using Google's stock malware?

The holidays are coming up. Now you could blow a grand on Google's newest fancy AI phone, with the "find my phone" feature, only for you to NOT to use those AI or GPS features which is a pure waste of money.

Or you can bank a little profit now, get a reliable 7a or 6a for you or close friends and family, and keep the rest in your favorite coin. These DON'T have the "find my phone" feature, which could be a potential hardware backdoor.

With 3 years of security patch support from GrapheneOS, and a

3 month hardware warranty from Simplified Privacy at just:

Pixel 7a: $335

Pixel 6a: $245

There is no real reason you need to spend a grand on Google's marketing hype. I'd be happy to sell you the 9 for a higher profit margin, but I got a moral obligation to tell you these are just as good.

Who knows what crypto and stock market prices will do. You can not only avoid tying your name to the IMEI hardware of the person you're giving the phone to, but also secure and lock-in some profit in a volatile market.

Plus you get an hour of education on how to use it. So if you're gifting it to a family member or friend, then if they suck with technology, you don't have to sit through their insanity.

My direct contact:

Session ID: Support

Signal #: +855 68 504 905

SimpleX or others: https://simplifiedprivacy.com/contact.html

well aren't you just a lovely optimist today. if we stay positive, we can convert more people to our side

Structure of our society is corrupt

Fiat Money - government typing numbers, which banks get first

CIA - puppet master for murdering dictators

Social media - Censorship Cult

Domain names - government database opinion

SMS - insecure expensive survelliance

~~~~

But it doesn't have to be this way:

All these can be replaced:

Nostr, Bastyon, PGP-contracts, Monero, Bitcoin, Arweave websites, Session, SimpleX

This is Aladdin,

A whole new world!!! For you and meeee

which groups are good? privacy one was dead when I checked before

Replying to Avatar mister_monster

Well, it's not that it's bad. Just some interesting decision making in how the client works, user experience, and some quirks. I'll give you some examples.

When replying to someone, unless the note you're replying to is short, you can't see the whole thing when replying. Even pushing "show more" won't actually show you all of the note if it is long enough, and there's no way to scroll down.

There's also the issue of the block list. Everyone knows about this with Amethyst, there's a block list for spammers that gets passed around and updated as people report spam, but you can't see it. The user should be able to see it if they want to unblock someone just for themselves.

Every time you open the application, their kind 0 which is their "about me" and avatar URL and all that gets fetched, as well as the actual avatat. Every. Single. Time. There's no caching. There should be caching, at least of follows, that's a lot of data, on low bandwidth connections this makes it unusable. It even fetches your own information! The sane way would be to cache this information and then update if it pulls it and it's different.

It saves drafts as draft kinds to the relay automatically, so if you're typing a reply and you go do something else for a second, the draft goes out, there's no way to turn this off. I don't want my half written notes sent to the relay!

That's not exhaustive, just what I can remember right now off the top of my head.

There are a lot of options that seem like basic user friendly functionality that just aren't there. I can't think of many off the top of my head, and going into that would turn this into a feature request ramble, but generally speaking client developers in every corner of tech have begun to make decisions for the user and restrict their options instead of empowering them, it's a trend I've noticed and is getting worse, and amethyst does some of that, but almost every nostr client I've used does something like this.

I have my ideas for an ideal client, and I don't expect that without building it myself, but there are some things that are so standard or self evident that you've got to ask, why is it done this way?

good points

Replying to Avatar Anon

Great writeup. Thanks for that. Just to give some feedback where I'm at in the process:

Phase 1: So with my new Pixel 9 w\ GrapheneOS, I initially bought a SIM and phone number for cash from Verizon. Location Services are turned off, except for apps that absolutely require it, like my anonymous Waze account. ProtonVPN obscures the IP address, but as you point out, anyone with my phone number can determine my location through triangulation.

Phase 2: I ditched the Verizon SIM and bought at esim from silent.link. The IP addresses they assign me are out of Warsaw, Poland of all places. But again, my VPN obscures this and displays a US-based IP to service providers. This works really well, but now I don't have a phone number or access to SMS.

Phase 3 (upcoming): I'll try getting a phone number from the Canadian outfit jmp.chat. The nice thing about these guys is they just forward inbound calls and SMS over XMPP. This is ideal because, and please correct me if I'm wrong, anyone investigating my phone number via jmp will hit a dead end in so far as jmp knows nothing about me other than the VPN IP address I use connect to their XMPP server. At that point, it seems the link between phone number and physical location has been broken; Jmp doesn't know my IMEI, and Silent.link doesn't know my phone number.

Whether or not I've introduced so much latency as to make phone calls impossible remains to be seen. I'll let you know if I get Phase 3 up and running.

One thing you mentioned that's given me pause though, is the self-hosted XMPP server. That would certainly cut out some latency if the server is near you. But it seems like by doing this you've tied a public IP address to yourself. I can think of some ways to obscure that address using some complicated forwarding, but wouldn't one be better off using a public XMPP server that's used by tons of other people rather than self-hosting?

self-hosting is giving you far more control over the metadata than a public server. Public server is just someone else running it, instead of you.

Cell Towers vs WiFi.

In this wicked useful and brand spanking new post, I'm going to teach you what data is being shared from cell towers vs WiFi, and what your options to reduce that are. The end has 3 example cellphone setups for the average person, somewhat savvy, and tinfoil hat.

~~~

When you connect to cellphone towers:

You're using the modem which has an IMEI identification number. Using a DeGoogled phone and a VPN does NOT change this from revealing info about the hardware TO the TOWER, such as where it was bought. And who bought it.

There's a couple ways to deal with this. One way is to buy it in cryptocurrency, from a company like mine. This is the easiest method for most people.

A second way is to use external hotspots for service, and buy those locally in cash. For example GLinet travel routers:

https://simplifiedprivacy.com/glinet/index.html

(or crypto like Calyx/Tmobile depending on your country.) Some prefer this because then they can put it in a faraday bag to hide their location at home. And only take it out of the faraday bag outside their house.

A third way is to change the IMEI. This method is controversial, as some say it's stealth. Others say you're drawing attention to yourself by giving them bullshit or previous numbers.

Some devices are easier to change then others. And some countries have made it illegal to change the IMEI. Of course, I can not recommend anything illegal. But if it is legal in your country, then generally older things such as Nokias are the easiest. LunarDAO has a guide on this:

https://wiki.lunardao.net/imei.html

A combination of the 2nd and 3rd way can be done by using something like Blue Merle. This is software for GLiNET travel routers that changes the IMEI of the router. Then you could in theory swap different SIM cards. However, this has a high risk of potential error for a new user, and it's unclear who's audited it:

https://github.com/srlabs/blue-merle

~~~

When you connect to WiFi:

You're NOT using the IMEI. Instead, you're getting a MAC address assigned to you by the router. This is a local area network. Android randomly generates MAC addresses for each connection, and you can actually see these in the settings of the WiFi connection.

In general, Android security is pretty good for WiFi. However, the CIA loves to hack routers. From the Wikileaks documents, we know they prefer to tunnel traffic from home routers directly to the CIA to see the traffic.

There's two main ways to avoid this. First, you could always use a VPN, which then bypasses the router's DNS.

Second, you could always be behind a firewall or travel router. The router's WAN port is the one communicating with a modem (public internet). While the router's LAN or (local area network) is the one giving you a MAC address.

~~~

What are some example setups?

average person:

Phone (bought with Crypto)

\/

SIM (bought with cash)

\/

VPN

\/

JMP Chat (VoIP)

(using public xmpp servers)

\/

Cell numbers

~~~~~

Savvy dude:

Phone (bought with Crypto)

\/

Silent Link (Crypto eSIM)

\/

VPN

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

Tinfoil hat:

Phone (bought with Crypto)

No SIM. Using Tor

\/

GLiNET router w/ SIM (Using VPN)

maybe faraday bags or IMEI changes

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

And of course, regular SMS is horrible. Go with a real messenger if the other person will allow it, (which one is actually not that critical): Signal, XMPP, Matrix, Session, SimpleX.

Self-hosting the VPS just provides another layer of protection that you control between the hostile adversary and you.

So our team can help you get a Phone, or setup a VPS:

https://simplifiedprivacy.com/they-see-everything/index.html

But even if you go with another option, I hope you digest my core message:

you've got way more control than you think.

careful with the iphone privacy of private keys... wouldn't want prying eyes on those naughty chats I see you doing

what do you like about it?

pretty cool. would be even better if we actually followed it

what you're saying is you want other people to make the choices for you.

So you could just pick a random person here and pretend they are in charge?

Amethyst is like the most developed, what do you think they need to get to?

Poll: What's your favorite Nostr client?