Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Hardware
  3. Mobile & Tablets
  4. i don't understand people who refuse to have a mobile phone.

i don't understand people who refuse to have a mobile phone.

Scheduled Pinned Locked Moved Mobile & Tablets
6 Posts 2 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • lizzy@social.vlhl.devL This user is from outside of this forum
    lizzy@social.vlhl.devL This user is from outside of this forum
    lizzy@social.vlhl.dev
    wrote last edited by
    #1
    i don't understand people who refuse to have a mobile phone. if you don't want the modern spyware trash just get a dumbphone and communicate via sms? not having a synchronous method of communication just makes life harder for yourself and everyone else around you
    abucci@buc.ciA 1 Reply Last reply
    0
    • lizzy@social.vlhl.devL lizzy@social.vlhl.dev
      i don't understand people who refuse to have a mobile phone. if you don't want the modern spyware trash just get a dumbphone and communicate via sms? not having a synchronous method of communication just makes life harder for yourself and everyone else around you
      abucci@buc.ciA This user is from outside of this forum
      abucci@buc.ciA This user is from outside of this forum
      abucci@buc.ci
      wrote last edited by
      #2
      @lizzy@social.vlhl.dev If your phone is connecting to a cell tower, which is necessary to send and receive SMS, then you can often be tracked to within a few meters. If you leave it on always, then your movements to and from school, work, home, stores, etc. is logged and studied. I've seen academic talks as far back as the early 2000s about this; something on the order of 80% of individuals can be identified just from the tracks their phones leave in cell tower logs. I'm sure that percentage is higher now. Your phone has a unique identifier so as soon as anyone is able to link that identifier to your IRL identity you become an easy surveillance target.

      Cell phones, even with just SMS, are a surveillance nightmare. People who care about that sort of thing are right to be cautious, in my opinion.
      lizzy@social.vlhl.devL 1 Reply Last reply
      0
      • abucci@buc.ciA abucci@buc.ci
        @lizzy@social.vlhl.dev If your phone is connecting to a cell tower, which is necessary to send and receive SMS, then you can often be tracked to within a few meters. If you leave it on always, then your movements to and from school, work, home, stores, etc. is logged and studied. I've seen academic talks as far back as the early 2000s about this; something on the order of 80% of individuals can be identified just from the tracks their phones leave in cell tower logs. I'm sure that percentage is higher now. Your phone has a unique identifier so as soon as anyone is able to link that identifier to your IRL identity you become an easy surveillance target.

        Cell phones, even with just SMS, are a surveillance nightmare. People who care about that sort of thing are right to be cautious, in my opinion.
        lizzy@social.vlhl.devL This user is from outside of this forum
        lizzy@social.vlhl.devL This user is from outside of this forum
        lizzy@social.vlhl.dev
        wrote last edited by
        #3
        @abucci then turn if off when you don't need it
        abucci@buc.ciA 1 Reply Last reply
        0
        • lizzy@social.vlhl.devL lizzy@social.vlhl.dev
          @abucci then turn if off when you don't need it
          abucci@buc.ciA This user is from outside of this forum
          abucci@buc.ciA This user is from outside of this forum
          abucci@buc.ci
          wrote last edited by
          #4
          @lizzy@social.vlhl.dev And if you forget? Or if your phone sends signals to cell towers you don't know about? Have you audited every chip in your dumb phone to make sure that when the software "off" (airplane mode or whatever) is toggled, it doesn't actually communicate with cell towers anyway?

          Like I said, people who are cautious about surveillance are right to worry about this sort of thing. These dangers are quite real.
          lizzy@social.vlhl.devL 1 Reply Last reply
          0
          • abucci@buc.ciA abucci@buc.ci
            @lizzy@social.vlhl.dev And if you forget? Or if your phone sends signals to cell towers you don't know about? Have you audited every chip in your dumb phone to make sure that when the software "off" (airplane mode or whatever) is toggled, it doesn't actually communicate with cell towers anyway?

            Like I said, people who are cautious about surveillance are right to worry about this sort of thing. These dangers are quite real.
            lizzy@social.vlhl.devL This user is from outside of this forum
            lizzy@social.vlhl.devL This user is from outside of this forum
            lizzy@social.vlhl.dev
            wrote last edited by
            #5
            @abucci there are solutions for this as well, such as radio proof phone pockets. but honestly it's not like this is used for commercial data collection; if anything it's state surveillance, and the state already has a large arsenal of other surveillance tools; i don't think it is feasible for a normal person with a normal threat model to account for these
            abucci@buc.ciA 1 Reply Last reply
            0
            • lizzy@social.vlhl.devL lizzy@social.vlhl.dev
              @abucci there are solutions for this as well, such as radio proof phone pockets. but honestly it's not like this is used for commercial data collection; if anything it's state surveillance, and the state already has a large arsenal of other surveillance tools; i don't think it is feasible for a normal person with a normal threat model to account for these
              abucci@buc.ciA This user is from outside of this forum
              abucci@buc.ciA This user is from outside of this forum
              abucci@buc.ci
              wrote last edited by
              #6
              @lizzy@social.vlhl.dev
              it's not like this is used for commercial data collection
              Corporations own and operate cell towers and the networks that feed them? In the talk I referenced, the academic had acquired data from corporations she was partnering with in her research. I honestly do not understand where this response is coming from.

              I feel like you're disputing for the sake of disputing, so this is my last one, which is unproductive for me. Have a good day!
              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              • incentiveI incentive moved this topic from Uncategorized
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups