Let's talk about ... anonymity. Crafting untracked phone

CarderPlanet

Professional
Messages
2,555
Reputation
7
Reaction score
592
Points
83
DISCLAIMER: This article is written for informational purposes only and is not a misconduct guide or training material for concealing wrongdoing.

Let's start with IRON

REQUIREMENTS:
  • MTK 65xx / 67xx series processor
  • GhostPhone (to change IMEI)
  • mute camera and microphone
  • refusal to use a SIM card

We need MTK 65xx / 67xx to support GhostPhone, which allows us to change the real IMEI of the smartphone. By IMEI, the phone is tracked by the cellular operator. Even without a SIM card in it, it means we remove the SIM card.

We will link online services to a virtual phone number. We will communicate through secure services. The traffic will go through an external modem and will be covered by VPN + TOR.

We make it possible to physically block the camera and microphone. Here AliExpress will come to our aid.

What have we got at this stage?​

A device that does not transmit information via GSM does not have a phone number and permanent IMEI by which it could be tracked through a telecom operator. In case of remote activation, the camera and microphone can be manually locked.

439dfe317f7fda62a83258b67da2460c.png


MOBILE OS

With physical security sorted out, now we will consider alternative operating systems. You will be surprised, but there are quite a few of them:
Alternative operating systems focus on greater privacy and security for their users. This means that they (most likely) save less user data, and that it is much more difficult to query for that data.

What have we got?​

A device that does not collect or transmit information (But this is not accurate) about its users to key IT corporations (Google, Apple, Facebook, or Yandex). Presumably, such a device is also not subject to tracking through ADINT (advertising identifiers). Subject to digital hygiene, of course.

BROWSERS

8b514bd252d8bfa6c1b400778aad793c.jpg


Now let's talk about browsers with increased anonymity and search engines to match them ...

And in our search engines:

What have we got?​

Getting rid of the tracking modules built into popular browsers and search engines. Add in a quality VPN and you can increase your security even more. But more on that next time.

30a9623a8e63cbcafdc59f892048bf11.jpg


OTHER SOFTWARE

Messenger:
signal
briar
jabber
element

Email:
runbox
preveil
zoho

File sharing:
dropmefiles
reeves
privatlab
onionshare
sync

Cloud storage:
mega
nextcloud
nordlocker

As a result, we have the maximum possible disposal of tracking modules built into popular applications, as well as minimizing the risks of transferring your data to third parties.

And finally, we remind you once again:

This article is written for informational purposes only and is not a misconduct guide or training material for concealing wrongdoing.
 
Top