this post was submitted on 13 Nov 2024
241 points (96.9% liked)
Technology
59345 readers
5951 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
From a quick skimming, it looks like their genius guides boil down to
If you actually care about your vulnerability, look what ACTUAL journalists on the run from a government or megacorporation do (dedicated hardware that can't even power up within a few city blocks of your other devices, for one). And understand that most of those boil down to "They know it is me and they are hunting me but I can live off the grid long enough to get this story out and then maybe they won't kill me afterward".
Those reasons aren’t obvious to me at all. Can you expand on this?
What exactly does Signal have to offer if one already uses iMessage with contact key verification?
Not all people are rich enough to have iPhones. And if you really want privacy, you wouldn't go for one anyway, instead choosing Graphene/Divest/Lineage. Not to mention iMessage is fully closed-source so you cannot even trust it to do what it does. I have issues wirh Signal, but at least I would take it over iMessage any day.
If you arent an actual journalist who is being personally, specifically hunted then you probably don't need to take the same precautions as one.
And yea, the guide boils down to "none of these things are 100% safe but they are realistic things you can do that can offer more protection than not doing them."
Your skimming of the article missed how they do indeed talk about the shortcomings of every suggestion they have. For example, the article also does indeed talk about how you can turn off gps but your phone will still ping towers revealing your location, and goes on to say that you can put your phone in a faraday bag but that isnt practical for most people but is indeed an option if you want to do it.
Lol you think the feds won't notice that a person of interest's phone went dark for the first time in 5 years?
Everyone gets this wrong. If you want to hide, hide inside your established patterns of life. You want to do shit across state line for a weekend? Don't turn off your phone, have your friend carry it around while you are gone.
The fundamental issue is still giving people a false sense of security. It is why it is INCREDIBLY important to be very very specific about what you do and don't get from various actions. Otherwise you have the same problem as all those people in countries where being LGBTQ was criminalized who realized elon musk owned their DMs.
Also: Putting your phone in a farraday bag half a mile from a protest doesn't take much effort to detect.
Just to expand on the phone thing because it amuses me:
In a past life myself and a few others had access to cell tower records for a specific company. As a research project, we applied what we would now call AI/ML concepts to sanitized data (basically all customer IDs were mapped to a different ID set and then the mapping was thrown away).
For poops and giggles I checked the tower nearest the local happy ending massage place. And, lo and behold, we were able to immediately get a list of everyone who turned their phone off for 30-60 minutes.