Permanently Deleted

  • Express [any,none/use name]
    ·
    edit-2
    4 years ago

    No, meta analysis is done off connections to upstream towers and connections to the cell network. The problem isn’t your device, but the fact the network itself is fully tapped. 4g also uses a symmetric cypher and doesn’t contain e2e communication so once you touch the tower all data is unencrypted within the carrier network. You have problems tracking off Bluetooth, WiFi and the carrier connections and with the carrier connections you have a blob of source code which isn’t controlled by the operating system and is communicated through via an abstraction layer to another device on the carrier side that logs all low layer communication and all high layer communication. Deviations from standard use that the majority of the population performs are also checked as unusual as we learned from the Snowden leaks about people who turn their phones off, so if you and your friend both turn your phones off at the same time for a secret communication it’s listed as an event and can be back correlated if/when you become a person of interest.

    Our saving grace is the people using these advanced systems are idiots.

    • CptKrkIsClmbngThMntn [any]
      ·
      4 years ago

      I'm still misunderstanding something. If I effectively make my phone a brick, remove the battery and everything, how is it still touching towers?

      • Express [any,none/use name]
        ·
        4 years ago

        The absence of touching a tower is in itself an action and when compared to population averages stands out like a huge red flag that this person is performing suspicious activity.