i don't understand people who refuse to have a mobile phone.
Mobile & Tablets
6
Posts
2
Posters
1
Views
-
i don't understand people who refuse to have a mobile phone. if you don't want the modern spyware trash just get a dumbphone and communicate via sms? not having a synchronous method of communication just makes life harder for yourself and everyone else around you
-
i don't understand people who refuse to have a mobile phone. if you don't want the modern spyware trash just get a dumbphone and communicate via sms? not having a synchronous method of communication just makes life harder for yourself and everyone else around you@lizzy@social.vlhl.dev If your phone is connecting to a cell tower, which is necessary to send and receive SMS, then you can often be tracked to within a few meters. If you leave it on always, then your movements to and from school, work, home, stores, etc. is logged and studied. I've seen academic talks as far back as the early 2000s about this; something on the order of 80% of individuals can be identified just from the tracks their phones leave in cell tower logs. I'm sure that percentage is higher now. Your phone has a unique identifier so as soon as anyone is able to link that identifier to your IRL identity you become an easy surveillance target.
Cell phones, even with just SMS, are a surveillance nightmare. People who care about that sort of thing are right to be cautious, in my opinion.
-
@lizzy@social.vlhl.dev If your phone is connecting to a cell tower, which is necessary to send and receive SMS, then you can often be tracked to within a few meters. If you leave it on always, then your movements to and from school, work, home, stores, etc. is logged and studied. I've seen academic talks as far back as the early 2000s about this; something on the order of 80% of individuals can be identified just from the tracks their phones leave in cell tower logs. I'm sure that percentage is higher now. Your phone has a unique identifier so as soon as anyone is able to link that identifier to your IRL identity you become an easy surveillance target.
Cell phones, even with just SMS, are a surveillance nightmare. People who care about that sort of thing are right to be cautious, in my opinion.@abucci then turn if off when you don't need it -
@abucci then turn if off when you don't need it@lizzy@social.vlhl.dev And if you forget? Or if your phone sends signals to cell towers you don't know about? Have you audited every chip in your dumb phone to make sure that when the software "off" (airplane mode or whatever) is toggled, it doesn't actually communicate with cell towers anyway?
Like I said, people who are cautious about surveillance are right to worry about this sort of thing. These dangers are quite real.
-
@lizzy@social.vlhl.dev And if you forget? Or if your phone sends signals to cell towers you don't know about? Have you audited every chip in your dumb phone to make sure that when the software "off" (airplane mode or whatever) is toggled, it doesn't actually communicate with cell towers anyway?
Like I said, people who are cautious about surveillance are right to worry about this sort of thing. These dangers are quite real.@abucci there are solutions for this as well, such as radio proof phone pockets. but honestly it's not like this is used for commercial data collection; if anything it's state surveillance, and the state already has a large arsenal of other surveillance tools; i don't think it is feasible for a normal person with a normal threat model to account for these -
@abucci there are solutions for this as well, such as radio proof phone pockets. but honestly it's not like this is used for commercial data collection; if anything it's state surveillance, and the state already has a large arsenal of other surveillance tools; i don't think it is feasible for a normal person with a normal threat model to account for these@lizzy@social.vlhl.dev
it's not like this is used for commercial data collection
Corporations own and operate cell towers and the networks that feed them? In the talk I referenced, the academic had acquired data from corporations she was partnering with in her research. I honestly do not understand where this response is coming from.
I feel like you're disputing for the sake of disputing, so this is my last one, which is unproductive for me. Have a good day!
-
R relay@relay.infosec.exchange shared this topic
-
I incentive moved this topic from Uncategorized