Your Smartphone: The Omnipresent Spy
Posted: Fri Sep 09, 2022 4:28 pm
It’s no secret we live in a mass surveillance state. The technology supposedly created to help us be a more energy efficient and productive society, is now our greatest threat to our privacy and self-sovereign well-being. Take a look around — from smart refrigerators to smart light bulbs, nanny cams to smart T.V.s, computers, Ring, Google Nest, Alexa and our smartphones are all capable of being used to spy on us, and that's just the list of equipment that is doing it before you step outside of your house. They’re all equipped with cameras, sensors and microphones that watch and monitor our every move, emotion and action. Many people will point to the Patriot Act as the beginning, when the US government began to spy over its own citizens' communications under the guise of “national security.” But it's far more than just the government -- though some prescient writers have already started to use the term "government" to include Jewish media, Jewish Big Tech, Jewish Wall Street and banking -- all parts of a new and deeply tyrannical power structure that rules Western societies.
How Cellular Providers Spy on Us
I'll start with cellular providers and talk about some of the tools at their disposal that are currently employed. Some of these terms and tools you probably have heard before, but might not be sure how they work. The important takeaway to remember is that the information captured from these tools can be subject to subpoena by lawyers or government agencies.
Carrier-branded smartphones: These are the phones you “lease” from any carrier on a month to month payment program. They come preloaded with a ton of apps that are carrier branded and cannot be removed. Most of the apps are carrier specific, and log the data you enter into them as well as tracking other apps.
AT&T Secure Family and the Google Play App are two examples — “Find your family, control your child’s screen time and manage their phone use.”
Key features include:
This app may share data with third parties.
This app may collect location and personal info.
Data is encrypted in transit.
Data cannot be deleted.
Mobile OS: A mobile OS is the operating system your smartphone uses, and is like a version of the Windows, macOS or Ubuntu on your personal computer. Today the smartphone market is dominated by two players. Google and Apple. By agreeing to the “terms and conditions” to use Google or Apple services, we give access to every aspect of our life, both private and public, to them. When people complain about Big Tech spying on us, it's really our own fault since we don't have to use any of these services. (Note: I will be discussing two projects to help Android users with their opt out plan. Sorry Apple users, you will have to wait until it gets easier to jailbreak an iPhone.)
Apps: Too many of them are on our smartphones. When was the last time you downloaded an app that didn't need access to every part of your phone to work? Nearly every app we download needs access to our contacts, phone, texts, photos, GPS location etc. All with the emphasis on “collecting information for better customer experience.” With the rise of malware apps, shouldn't we be paying more attention to the apps we install and the permissions given to them?
Trilateration: GPS. Our cell phones constantly send out signals looking to receive “acknowledgement” signals from nearby cell towers. The more towers our smartphones connect with, the better the accuracy to pinpoint your location to within feet. Note: Not even turning off your GPS is foolproof. That is because our smartphones are still connected to nearby towers via the radio inside them. This won't pinpoint your exact location but just enough to provide the necessary information as to your whereabouts at a particular time.
SIM swap attacks: This is when a scammer is able to pose as you (through social engineering), and calls your cell service provider to trick the company into porting over your cell number to a SIM in their possession. The goal is to receive one-time access codes to your financial accounts. Hint: Bank accounts are always vulnerable to this. If you use Bitcoin, you are still vulnerable if you leave much BTC on a centralized exchange! Keep it in an offline wallet, and you're safe, though.
Stingrays: Physical hardware used by government agencies around the world. The premise behind the attack is that Stingrays operate as “fake” cell phone towers by providing a stronger signal, so that your smartphone believes it is talking to a nearby tower, when in fact, some agency is operating as the man-in-the-middle, recording all data (text, calls, and data) transmitted from the person of interest. The major issue with this, anyone who happens to wander by the intended target has all of their information captured as well. Everyone in the vicinity’s privacy is at risk when this tactic is used.
Social, political or economic injustice rallies: If there was ever more of an example on why you should use a burner phone (a cheap phone picked up at a retailer with cash with no name or credit information attached to it, and thrown away after a short use) or privacy-focused device for these events, it was the fallout from the Canadian Truckers Rally and the events of January 6, 2021. In the months after the events, governments and Jewish groups and individuals worked with Big Tech to track down and arrest a slew of people, just by viewing their social media feeds or subpoenaing cell phone records from carriers. Those cell phone records were used to determine if you were anywhere near such protests in order to prosecute individuals. I must stress this again, never bring your daily phone to any such rally ever. Always bring a backup phone you can ditch or destroy -- no matter what.
How to Start to Opt Out
To begin, head over to https://calyxos.org/ or https://grapheneos.org/ to do some light reading. These two projects are similar in nature and offer a great alternative mobile OS that is free of Google services and all the tracking included. Their respective Web sites have a list of compatible devices and installation guides. The two projects have grown the most in popularity amongst Bitcoiners, but anyone can use them.
Privacy is a right we must now fight for, since we have lost so much to the Jewish technocrats and their obedient politicians and other servants -- we all should all remember this, and not take it lightly or sacrifice it for convenience. Nothing is 100% secure and private, unless you are planning to go live off the grid in the mountains. If your wife isn't thrilled about that idea, at least begin to explore an opt out plan when it comes to communications and your finances. Family survival and projecting your genes -- and your wealth -- over the generations may well depend on it.
How Cellular Providers Spy on Us
I'll start with cellular providers and talk about some of the tools at their disposal that are currently employed. Some of these terms and tools you probably have heard before, but might not be sure how they work. The important takeaway to remember is that the information captured from these tools can be subject to subpoena by lawyers or government agencies.
Carrier-branded smartphones: These are the phones you “lease” from any carrier on a month to month payment program. They come preloaded with a ton of apps that are carrier branded and cannot be removed. Most of the apps are carrier specific, and log the data you enter into them as well as tracking other apps.
AT&T Secure Family and the Google Play App are two examples — “Find your family, control your child’s screen time and manage their phone use.”
Key features include:
This app may share data with third parties.
This app may collect location and personal info.
Data is encrypted in transit.
Data cannot be deleted.
Mobile OS: A mobile OS is the operating system your smartphone uses, and is like a version of the Windows, macOS or Ubuntu on your personal computer. Today the smartphone market is dominated by two players. Google and Apple. By agreeing to the “terms and conditions” to use Google or Apple services, we give access to every aspect of our life, both private and public, to them. When people complain about Big Tech spying on us, it's really our own fault since we don't have to use any of these services. (Note: I will be discussing two projects to help Android users with their opt out plan. Sorry Apple users, you will have to wait until it gets easier to jailbreak an iPhone.)
Apps: Too many of them are on our smartphones. When was the last time you downloaded an app that didn't need access to every part of your phone to work? Nearly every app we download needs access to our contacts, phone, texts, photos, GPS location etc. All with the emphasis on “collecting information for better customer experience.” With the rise of malware apps, shouldn't we be paying more attention to the apps we install and the permissions given to them?
Trilateration: GPS. Our cell phones constantly send out signals looking to receive “acknowledgement” signals from nearby cell towers. The more towers our smartphones connect with, the better the accuracy to pinpoint your location to within feet. Note: Not even turning off your GPS is foolproof. That is because our smartphones are still connected to nearby towers via the radio inside them. This won't pinpoint your exact location but just enough to provide the necessary information as to your whereabouts at a particular time.
SIM swap attacks: This is when a scammer is able to pose as you (through social engineering), and calls your cell service provider to trick the company into porting over your cell number to a SIM in their possession. The goal is to receive one-time access codes to your financial accounts. Hint: Bank accounts are always vulnerable to this. If you use Bitcoin, you are still vulnerable if you leave much BTC on a centralized exchange! Keep it in an offline wallet, and you're safe, though.
Stingrays: Physical hardware used by government agencies around the world. The premise behind the attack is that Stingrays operate as “fake” cell phone towers by providing a stronger signal, so that your smartphone believes it is talking to a nearby tower, when in fact, some agency is operating as the man-in-the-middle, recording all data (text, calls, and data) transmitted from the person of interest. The major issue with this, anyone who happens to wander by the intended target has all of their information captured as well. Everyone in the vicinity’s privacy is at risk when this tactic is used.
Social, political or economic injustice rallies: If there was ever more of an example on why you should use a burner phone (a cheap phone picked up at a retailer with cash with no name or credit information attached to it, and thrown away after a short use) or privacy-focused device for these events, it was the fallout from the Canadian Truckers Rally and the events of January 6, 2021. In the months after the events, governments and Jewish groups and individuals worked with Big Tech to track down and arrest a slew of people, just by viewing their social media feeds or subpoenaing cell phone records from carriers. Those cell phone records were used to determine if you were anywhere near such protests in order to prosecute individuals. I must stress this again, never bring your daily phone to any such rally ever. Always bring a backup phone you can ditch or destroy -- no matter what.
How to Start to Opt Out
To begin, head over to https://calyxos.org/ or https://grapheneos.org/ to do some light reading. These two projects are similar in nature and offer a great alternative mobile OS that is free of Google services and all the tracking included. Their respective Web sites have a list of compatible devices and installation guides. The two projects have grown the most in popularity amongst Bitcoiners, but anyone can use them.
Privacy is a right we must now fight for, since we have lost so much to the Jewish technocrats and their obedient politicians and other servants -- we all should all remember this, and not take it lightly or sacrifice it for convenience. Nothing is 100% secure and private, unless you are planning to go live off the grid in the mountains. If your wife isn't thrilled about that idea, at least begin to explore an opt out plan when it comes to communications and your finances. Family survival and projecting your genes -- and your wealth -- over the generations may well depend on it.