Where did I make assumptions about you?
Where did I make assumptions about you?
The issue is, that unlike movies, games and others, these plugins are no harder to pirate, but way harder to hide. It’s not like a “Yeah, you could get in trouble.”, but more like a “If anyone catches you, you are not going to financially recover.”, which given the scope of clients (Fam, friends and yourself) and the fact, that these Websites are likely to be on the internet, is incredibly likely. Why not use a free and open source alternative?
No, I would argue incredibly helpful reply.
Good call if true
Well guess what. They say that cause they’re damn right.
While true, that’s sumpy becaise the Tor network is used as much as it is. If usage of Lokinet were to pick up, it would just slow down. Knowing the developers of Oxen, they’d then probably cut down on it’s anonymity to increase speed again.
There is an app by divested computing group that wraps google maps in a webview. Can be very privacy firendly depending on the browser your system uses as it’s webview. I only use it if other maps don’t work. Organic maps is crazy good.
I don’t think you understood half of what I wrote correctly. Feel free to skip the next paragraph if you already know about triangulation in the context of cell towers.
Your phone, when connected to a cellular network, can be tracked by cellular towers. Take a single tower to which you are connected. The tower has a multitude of devices which are connected to it. Since latency is a large issue due to distance, communication is less trivial. To prevent waiting for packets from a device for too long, the cell tower will divide a certain time into sectors. In each of these sectors, one device is supposed to send it’s packet. To hit this time window however, the device has to send it’s packet in advance, as to cancel out the latency of the transmission. By how much is determined by the distance between the cell tower and the device. This system requires knowledge of distance. This distance has to be close enough to the real distance, to cancel out latency and maximize the time a device can send data. With obstacles that may reflect the waves, the preciseness of the distance determined is correlated to the stability of the connection. Given that a lot of people can be using a cell tower at once, there are towers which are segmented. These work slightly differently than non segmented ones, in that they have multiple antenna sending and receiving signals in different directions. A segment of a tower with 6 segments would then be responsible for all devices which are in the area of 60 degrees from the tower. The distance together with the general direction already gives us a pretty accurate depiction of the user’s location. However, since most towers are neither segmented, nor would a say 6 segmented one give as accurate of a reading if the device is 3 miles away (that would be a possible curve of pi(≈3) miles which the device could be on, given a perfectly flat ground), let’s make this even more interesting. With a simple, rough time stamp, we can find out the location of a device up to an accuracy of a single point. Add a second cell tower, make the device connect to the towers one at a time and you have the exact position of the device. Well, pretty close to exact at least.
With that said, the reason why a sim card is the issue in this constellation is the unique identifier. If a network of cell towers can determine where you are located and the imsi is tied to your identity, then your location is tied to your identity. And if you think, even for a second, that mobile internet providers would not take advantage of this, think again. A very popular example of this are malls wanting to know where their customers came from.
Now, if you have a device with GrapheneOS (DivestOS too I think, don’t know) for example, then you will have the ability to entirely switch off the cellular antenna of your phone (which one should likely do if they don’t have a sim anyways). This is supported by hardware due to airplane mode, where the airplane requires least interference.
Now that I have explained in more detail, do you understand better why a sim card is a privacy concern?
Well, if you want to activate an esim on any other Android rom, you need to use Google services and have an internet connection. DivestOS is the first rom to implement an open source version of eUICC, which is used for activation, called OpeneUICC. It also does not need an internet connection, so nobody knows that the esim is installed on your device. That is, until you actually use it, of course. This is in line with DivestOS actively trying to “deblob” (remove binary, closed source parts of) Android.
The second part, about why sim is not very private, well it has a unique identifier and the technology was specifically designed to pinpoint your location, as this helps keep a good connection.
Also, why did my comment get downvoted?
Also, privacy fruendly esim activation anyone? (Am aware of privacy issues with sim)
So now instead of being incredibly poor, they will starve to death. How fun!
Alright, thank you.
Didn’t read OP, what does this have to do with crypto?
Or what? You wanna jump through his screen you goblin?
deleted by creator
Yeah no, it is not that deep. I just did not know if I could not sign it. Appears I have to.
First, I am not a male. Second, I do believe the US gov has my data. Every single piece that is floating out there. I will still not share it with them, may there be the odd chance they do not yet have it.
Literally in a Telegram group that uploads the entire content of 5 not yet uploaded creators every week. At least that’s what they adviertise andnhave so far delivered. “WHAT THA FUCK” “Holy shit, yo what’s the matter? Whats happened? What’s going on?” " THERE’S SO MUCH PORN”