What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

How to use an Apple Computer and never be tracked

Marco61

Member
You cannot rely on technology anymore. Assume it all has been compromised internally. The NSA has hundreds of millions of USD at its disposal to buy backdoors into encryption and security software. If the company is unlikely to be compromised out of greed, they will have the US justice system's weight placed upon it by means of threats of litigation or an introduction of a diminished ability to conduct business legally.
 

babelfish

Member
You cannot rely on technology anymore. Assume it all has been compromised internally. The NSA has hundreds of millions of USD at its disposal to buy backdoors into encryption and security software. If the company is unlikely to be compromised out of greed, they will have the US justice system's weight placed upon it by means of threats of litigation or an introduction of a diminished ability to conduct business legally.

billions. you can, however rely on hackers to find another way. It is absolutely impossible to block people. the more backdoors that get installed, the easier it is for hackers to find them.

PSA
Think, if all the intersections had cameras and allowed for live updates to the lights to sync (getting there, stuff is being tested) one would only need to just type a couple commands on a cell phone or smartwatch and BAM. all ur hardwarez is mine. Free pass to the city.

If you don't believe it, look at all the car hacks (There's a new tool out that makes it easy for everyone), the water and power hacks - these are from boxes that had holes and backdoors installed - and will never be updated. Why does DRM not work for a lifetime? because it can only be built once, and then EVERYONE gets to crack at it for its entire lifetime. Instead the punishment for taking unauthorized access of these machines is increased.

What amazes me is how little security government agencies really have. Remember, if a device is ever connected to a network, it can never again REALLY be trusted. Encrypt everything, even your cell phone. Set a password, and when driving don't keep it on your person.

If your afraid of being compromised for your personal security or secrets, its probably a good idea to turn it off. If you think its off and the battery's still in, your wrong, they can ping it. if your phone's battery doesn't come out YOU CANNOT SECURE YOURSELF AGAINST BEING FOUND. (assuming they are actually looking of course). but equally valid for when taking a private trip somewhere.

It's nice to drop off the grid now and then. But, even smarter is just leaving your phone behind. don't drive a new car - get one that's got as little computer as possible, they have populated virtually all new cars with black boxes that _could_ be used against you. AND NO GPS.

Drive something that's got a significant presence on the road, not in any flashy colors or trims, and circle around a bit. When leaving to go to your happy place, drive in the wrong direction for a while, then another and another till you end up going where you would really like to. Plan alternate routes in and out. Look for areas where visibility is limited. If a route is semi-permanent, you might even find a few choice spots, or prep a few.

Oh yeah, and never go on the internet from your happy place. or on the phone. not unless its double-billing as something else that's easy to explain the time spent - so easy you don't have to explain.

rise of forever day bugs

I think i've even spotted the hardware the next 'inter/intra'net will be built on.

http:// www.kickstarter.com /projects/2021474419/ flutter-20-wireless-arduino-with-half-mile-1km-ran
 

gaiusmarius

me
Veteran
people should remember that most modern phones have a secret back up battery, so even taking it out will not stop them remotly activating the microphone and camera if you got a camera.

what will work is wrapping it in a few layers of aliminium foil. kills the signal and stops any signal getting to the phone. you can try it easy yourself, you only need a couple of layers and a tight wrap and it will no longer receive a signal. they say a microwave oven will do the same thing.
 

fido

Active member
Yeah dude. Hushmail will respond to govt subpoenas or court orders. Thats why Osama didnt use it. He used PGP. I think.
what he said.
they are run out of canada and they sell ya out faster than you can blink.
most folks dont that and still use them.
thanks for sharing that info bro.
fido
 

johnny54

Member
http://boingboing.net/2014/07/03/if-you-read-boing-boing-the-n.html

According to the story, the NSA targets anyone who searches for online articles about Tails (highly secure operating system intended to be booted from an external USB stick without leaving behind any trace of your activity on either your computer or the drive)
-- or Tor (The Onion Router, which we've been posted about since 2004). Anyone who is determined to be using Tor is also targeted for long-term surveillance and retention.
 

armedoldhippy

Well-known member
Veteran
anyone here been reading up on XKEYscore? latest NSA leak says that even looking for information about TOR & other security programs gets you put on "the list" to be watched. demanding privacy highlights you now, apparently...
 

mojave green

rockin in the free world
Veteran
well then...

well then...

i been on their watch list then as i have been using encrypted proxy servers for some time. this was predicted by the crypto cats long ago. unfortunately the only way to make it not so, is if EVERYBODY encrypts. there is just too much apathy at this point. let em collect it and store it, but it's gonna cost em (time and resources) to decrypt the data on a small fry.
:moon:
 
Top