Ava on Nostr: How far you want to go depends on your threat model. The higher the threat model, the ...
How far you want to go depends on your threat model. The higher the threat model, the more you will have to sacrifice convenience. It may be a situation where radio communication with frewuency hopping and encryption is better than using a cell at all.
Keep your phone's location services off. Either way, your SIM can track you, your phone is constantly pinging cell towers. The only way to use a cellphone anonymously is to have airplane mode activated 24/7 with no SIM card, plugged directly into a modem, no WiFi. Then use Tor, or at the very least an always on VPN with killswitch engaged. GrapheneOS will spoof your phone's MAC address.
The travel phone should be kept in a faraday bag when it's in your car and at frequented locations that could doxx you. This is not always possible for many people, but the more convenience, the less privacy.
The idea is to understand the more often you use it outside and where you use it, the easier it will be to fingerprint and track you and act accordingly.
New scanning tech allows your device to be "fingerprinted" to your tag number and registration, and all the other signals coming from your car (car cell modem, animal chip, mobile, even library books) with a scanner WHILE YOUR CAR IS MOVING.
Definitely put the phone in airplane mode or turn it off and keep it in the faraday bag whenever possible before turning into a parking lot. Scanners are often used in parking lots.
If you have to travel, silent.link has some pretty awesome pay as you go, super fast data only esims. Because they are anonymous international esims, the cell providers can see that they are on the network, but because they are roaming on the network, the network provider cannot attach that sim to your identity.
This does not however prevent device scanning or triangulation, hence the faraday bag.
You have to know your threat model. Some people with more extreme threat models may choose to use no phone or use multiple throwaway phones and multiple esims.
When travelling, carry an open source travel WiFi router like the Beryl AX with OpenWrt, OpenVPN, and Wireguard pre-installed and connect to that LINE-IN instead of the hotel WiFi.
Published at
2024-05-29 00:44:20Event JSON
{
"id": "0669e0f2e50e05c8524f9306457f66186e9c5feb7f528cfb4651de637e2f0b6c",
"pubkey": "4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d",
"created_at": 1716943460,
"kind": 1,
"tags": [
[
"e",
"981d263a7c68c4f701d0bcad2b7dd535844880e8b9a22d9a432b8e75cac47df0",
"",
"root"
],
[
"e",
"69cfa241ed75225155347bee81e2924d0584f1b694544bf3eaa3dde8e0d09841"
],
[
"e",
"461da84e6e143382e1875009fe3f1781fe72ed394ceb5f9a0bb80fa3a7516a81",
"",
"reply"
],
[
"p",
"4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d"
],
[
"p",
"84dee6e676e5bb67b4ad4e042cf70cbd8681155db535942fcc6a0533858a7240"
],
[
"p",
"9bc2d34ddda83d942a1fdd36a7487f9aaec740db24ea79732d90e383d19d2948"
],
[
"r",
"silent.link"
]
],
"content": "How far you want to go depends on your threat model. The higher the threat model, the more you will have to sacrifice convenience. It may be a situation where radio communication with frewuency hopping and encryption is better than using a cell at all.\n\nKeep your phone's location services off. Either way, your SIM can track you, your phone is constantly pinging cell towers. The only way to use a cellphone anonymously is to have airplane mode activated 24/7 with no SIM card, plugged directly into a modem, no WiFi. Then use Tor, or at the very least an always on VPN with killswitch engaged. GrapheneOS will spoof your phone's MAC address.\n\nThe travel phone should be kept in a faraday bag when it's in your car and at frequented locations that could doxx you. This is not always possible for many people, but the more convenience, the less privacy.\n\nThe idea is to understand the more often you use it outside and where you use it, the easier it will be to fingerprint and track you and act accordingly.\n\nNew scanning tech allows your device to be \"fingerprinted\" to your tag number and registration, and all the other signals coming from your car (car cell modem, animal chip, mobile, even library books) with a scanner WHILE YOUR CAR IS MOVING. \n\nDefinitely put the phone in airplane mode or turn it off and keep it in the faraday bag whenever possible before turning into a parking lot. Scanners are often used in parking lots.\n\nIf you have to travel, silent.link has some pretty awesome pay as you go, super fast data only esims. Because they are anonymous international esims, the cell providers can see that they are on the network, but because they are roaming on the network, the network provider cannot attach that sim to your identity. \n\nThis does not however prevent device scanning or triangulation, hence the faraday bag.\n\nYou have to know your threat model. Some people with more extreme threat models may choose to use no phone or use multiple throwaway phones and multiple esims.\n\nWhen travelling, carry an open source travel WiFi router like the Beryl AX with OpenWrt, OpenVPN, and Wireguard pre-installed and connect to that LINE-IN instead of the hotel WiFi.\n",
"sig": "9e300b8505feaabd24910e0dfcff3262f54d1cdd2ed99e2e9e13cfccec44a54b8ec68d1bde24a306f5da72e4293941dc4f217a4a858bbece4e3f9c6b49cccbe1"
}