No SIM? No Problem!
Вставка
- Опубліковано 3 лип 2024
- Your phone is more than just a communication tool; it’s a powerful tracking device, and the SIM card inside is a key reason why.
I don’t actually have a SIM card in any of my phones, and in this video I’ll explain the reasons why.
I’ll also talk about alternative ways that you can still have connectivity on the go without a SIM in your phone, and I’ll dive into the downsides of not having a SIM in your phone.
00:00 Your Phone is a Tracking Tool
01:12 What is a SIM
01:44 Location Tracking
02:36 Covert Data Transmission
06:35 Split Tunneling
08:40 Internet-Only Phones
10:52 Mobile Hotpots
11:28 Benefits of Siloing SIM on a Separate Device
14:28 Calyx Hotspots
16:33 Downsides
18:36 Support the Calyx Institute
20:30 Summary
Having a SIM card in your phone has a lot of privacy downsides. But not having a SIM in your phone definitely has tradeoffs. You’ll have to assess whether this is something that’s right for your life.
Special Thanks to Nick Merrill and David Allan Burgess for lending their time and expertise!
You can learn more about Calyx here:
calyxinstitute.org/
Previous video in this phone privacy series, explaining how phones without a SIM also talk to cell towers, but why it's not as extensive: • You're LEAKING Your LO...
Thanks to the Mysk team for their important research
/ mysk_co
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi Brockwell
To support NBTV, visit:
www.nbtv.media/support
(tax-deductible in the US)
Visit our shop!
Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Visit the NBTV website:
nbtv.media
Watch this video on LBRY!
open.lbry.com/@NaomiBrockwell...
________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!
Recommended Books:
Beginner's Introduction To Privacy - Naomi Brockwell
amzn.to/3WDSfku
Permanent Record - Edward Snowden
amzn.to/305negc
What has the government done to our money - Rothbard
amzn.to/2KMzmcu
Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
amzn.to/3BLZ1gq
Digital version: inteltechniques.com/book7.html (non affiliate link)
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
amzn.to/2UQmJ4m
Some of my favorite products to help protect your privacy!
Brave browser: brave.com/nao076
Faraday bag (signal stopping, to protect your fob, credit card, computer, and phone)
amzn.to/3z02UiF
Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
amzn.to/2SVh0J2
Camera tape (electrical tape is the best tape for covering phone and computer cameras)
amzn.to/3Xn8xBn
USB-C to ethernet adapter:
amzn.to/2lOVBoy
Privacy Screens (use your phone and computer in public? Keep your information safe!)
Computer: (Search for the size right for your computer)
MacBook Air 13" amzn.to/3VQvpZ7
HP/Dell/Acer/Asus/Lenovo 15.6" amzn.to/3KK1Oda
Lenovo Thinkpad/HP Elitebook/Dell 14" amzn.to/4enT2zq
Phone: (Search for the size for your phone, decide whether you want glass or plastic!)
Galaxy s24 - amzn.to/3VGgb8H
iPhone 15 - amzn.to/45vCd1h
Pixel 8 - amzn.to/3KFDuJF - Наука та технологія
I remember a time when I used to not even walk around with a cell phone. Life was actually not difficult back then.
Life was more wholesome then.
Isn't it amazing? I refused to get one until a situation when it would have been real handy and now like an idiot afraid to go out without it in case something happens like an emergency. Like you said, we managed it seemed just fine in the past without it.
My mobile never leaves the house. Not a smart phone; a flip phone. I can’t think of anything worse than being constantly available! Luddites rule. 😂
@@Kaige46 That's awesome and what I aspire to do. I've installed ethernet connections to hard wire all our phones and devices, but the next stage is doing away with them completely. We refuse to be tracked with their digital ID and coming digital currencies. Analog all the way.
I had to have phone when I was 'site service engineer' (great title, shitty job no, engineering degree needed)
Being on call 24/7/344 sucked ( I did get some time off although spending months re-doing badly done 'repairs' also sucked enough I didn't want to take time off)
Avoided having a phone until 2020, when my wife 'forced' me to use the one she bought me.
My grandson 'borrowed' it, was dancing to Tik-Toc video and accidentally dropped it in toilet 7~8 months ago.
I no longer have cell phone and don't miss it one bit.
The SIM is your cell network ID. The phone has its own ID and that can also be tracked. The SIM is just for account and billing purposes. The phone with its unique ID is tracked by the NSA in addition to the SIM or account ID.
the phone would need to be modified in a way that disconnects the baseband from it's power source so that it stops communicating with the towers. otherwise all you've done is disconnected your phone bill and rights to use the tower, even though the tower continues to use you.
@DaveHoltzman Exactly! Easy to "go dark" by inserting phone into a Faraday envelope/container.
@@peterm.eggers520
I completely agree with the use of a Faraday pouch!!
I bought one during the time when FEMA was trying to send out an emergency communication with everyone's phone last year!!
airplane mode disables it tho
@@phr3ui559 Airplane mode is a system software feature. It may or may not disable phone broadcast ID on an unpacked phone. The phone firmware of the few phones I know can certainly maintain a trackable heartbeat ping without operating system support
I remember when (1960's) to make a call you had to walk down the hill to the phone box and to speak to relatives in Australia you had to book a call and fill the telephone with cash before pressing button A. How things have evolved during my lifetime. Just a gentle stroll down memory lane.
Phone was called a talk about If I remember. At home it was a land line.. Go down the street it turned into a cell mobile phone
When my parents got married and moved to Vegas my mom’s first job was an operator and she had to physically plug in each call to connect it.
I remember having a party line with my neighbor. How's that for a walk down memory lane. Most people have no idea what that was.
I remember Mum answering the house phone in the 60s in her best telephone voice, "Hello, Barton 580😂😂😂
@benjamindover7399 Party lines were common in rural America into the 1960s. They functionality re-emerged as "custom ringing" for awhile after party lines died-out.
I'm sorry, but every phone without a SIM still continuously triangulates and connects to cell towers. With this, your IMEI is sent. This is why you can call 911 without a SIM. For a corporation or state actor that wants to surveil you, it wouldn't make a big difference.
if you want to be untraceable, buying a smartphone is probably the last thing you want to do.
You need the flymodus yes
@@BARLINDBOTN Flight mode won't help you. It will still gather data and location and send it as soon as there is network connection.
People are ignorant to how wireless communications work. They just don’t get it and potentially never will.
@@rubenvd3913🎯🎯🎯🎯🎯🎯🎯🎤🎤🎤🎤🎤
People are ignorant on how wireless communications work.
We need a digital bill of rights.
No matter what it'd be so watered down as to be worthless. The people wanting the information control the people we think we elect. Psychopaths are and always will be among us. They need to be identified and excluded from being able to exert influence or control over anyone.
chinese gov't ccp
Well, we had one but it was on Kevin's phone and he's kinda clumsy.
You already have a bill of rights, but like Snowden said, most people scroll right past the user agreements to start using the device and don't bother reading the contract they are entering... So... is that really consent?
Absolutely!!!
For starters, this video missed the privacy target by miles. Second, just for the record, I am a telecommunications engineer, working in this field for 43 years, I design, build and write the software for systems that test telecommunications equipment, so I have a very good grasp how it all works. So lets say forget the SIM card and lets use Wifi as you suggested, or Bluetooth, or some other wireless protocol. The moment your phone transmits ANYTHING using any of those technologies within the range of another phone, your phone just revealed its location to the entire world, if that other phone happens to be reporting what it heard. It already knows its GPS location, so clearly you must be pretty darn close to it. Likewise, it can monitor your communications and acquire your very unique MAC address of either your WIFI or Bluetooth (if it isn't rotated randomly) or if you use the NFC feature of your phone, or the Ultrabroadband feature, and additionally, a lot of phones can and do report to their manufacturer for updates and they can pull logs of whatever they feel is important, and likewise tell it to create logs of whatever they want to know. So are you wearing a bag over your head so cameras can't see your face, or covering your license plate so cameras along the roads can't track your car? What about your wireless bluetooth keyboard or mouse you use with your computer at home, its singing to every phone around you, and not all wireless devices encrypt their communications with the other end. Removing the SIM is just the tip of the iceberg of what can be done to remain anonymous. In this day and age, every phone (and mobile hotspot) out there can be potentially spying on you, even if you are careful with your phone. But as far as the SIM you got a lot of that right, depending on the SIM.
agree, if you want be anonymous, just go to live deep on the Brazilian rain forest
How would it know the "GPS location" if the GPS is not running? Why would GPS be on when not specifically needed. Why would anything be on when not specifically needed.
Did you ever work on the CALEA functionality?
OK, but a wireless keyboard or mouse isn't telling the world that you are the one using it, it's just advertising its existence and availability to attach, and passing keystrokes/mouse clicks, and it is short range. Or are you suggesting that the data can be captured & used to reconstruct what you're doing and who you are? That seems unlikely, unless you're a person of interest to an alphabet agency. There are spook level issues, which aren't issues that most average people need to worry about. Reasonable precautions, iow, not living in a faraday cage.
So can you tell me how I'm being hacked through a caravan of cars coming around me and yesterday my wi-fi was showing up and with a ? and was asking to connect to Internet.
Life in the 80's and 90's was peaceful and more free
Poser Preztildents, ruined this vcoun try
Never caught
Oh yeah! And that heroin everyone used!
I miss those times. That's when the internet was accessed via a Unix or VAX terminal
@@TheCherrybuster I never met or saw a single person taking or dealing Heroin in the 70s and 80s or since. I'm in England though. Not everyone in the world is a crackhead you know, and many of us do not even drink alcohol or smoke etc.
@@EgoShredder have you ever seen or met a person robbed by a junky?
A wealth of info in this segment. TYVM 😊
I worked in Telco a decade ago and at the time our tracking was so accurate that we could pinpoint a customer's location in the exact apartment in a building for troubleshooting purposes. And where I come from we have to keep these records for 6 months.
Yet they cannot find the guy who dropped off the bombs on 1/06
@@rmf2941 Criminals obviously don´t carry their tracking devices around with them.. a monkey could work that out I´m pretty sure.
911 can only pinpoint within 300 feet?
@@rmf2941 Was he carrying a phone?
@@rmf2941 Because "finding them" would implicate the investigators
I’ve never even heard of this siloing idea. A brilliant mind had to come up with this. It’s pretty sad all the hoops we need to jump through just because we want to use the internet anonymously. Thanks for the informative video, as always.
You can get a virtual private network software for your phone. A VPN encrypts your data stream and sends it to a random server which then directs your stream to the web site you want it to go to. Your phone service provider will not know what you are doing online and will only know what VPN server your data stream is being sent to.
@@oldtimefarmboy617 I know what a vpn is. Thanks.
@@oldtimefarmboy617Hi I'm knot very tech savvy,how do you download a VPN and can you download one onto any kind of Android device,Thank-you?
Cellular network hotspots have been around since 3G, perhaps longer. Businesses have generally used them to allow laptops and other gear connect to a network to get onto VPN to connect into the main office to conduct work, check email, etc. while at conferences. So it's pretty natural to move the VPN functionality into the device itself to save a couple of steps. It still doesn't silo data like this video claims it does. Sure it'll move telemetry behind the VPN but Google/Apple still knows who you are regardless of where that data is coming from. And GPS location tracking also remains unaffected. In short, nothing has really changed other than adding an extra device.
@@oldtimefarmboy617 She explained in the video that the phone can bypass the vpn.
How did I know about this channel before. Very useful, relevant, and well researched content - well done!
Thanks for the tip about Calyx.
I’d love to see you do a ‘phone set up’ video for both IOS and Android. How how to set up, get apps/disable apps, and make the popular devices as private as possible from start to finish
Impossible! Only a de-Googled phone can actually give you "privacy"! 😂🤦♂️ Wow. You're extremely misinformed. We've known this since the start of smartphone apps!
Banks and other security minded sites refuse to work with a VPN (at least here in India, where needs for privacy is more). even amazon, ebay etc make tons of fuss when I ask them to go through a VPN. Also, voip calls do not work here if you do not have a sim. even signal will not work without a sim.
@@janami-dharmam Interesting.
@@alexanderSydneyOz its india, the scam never sleeps ^^
A waste of time !
It'll only work if you buy a phone anonymously and never insert a SIM linked to you. Because, if you insert it, they'll then link the IMEI to you, and the IMEI is sent to towers no matter the SIM is in or not. (And I don't absolutely trust software checkboxes that claim "airplane mode")
The hotspots she advertises are sold anonymously, so I assume they are "activated" already. And when renewing, I assume, they'll ask which IMSI the payment is for, then accept cash or cryptocurrency?... @@Albdean
You can also never log into social media bank accounts email anything. It can also be linked to you that way
She’s not suggesting you can go completely anonymous with this, it’s merely a way to limit the amount of information being collected from your phone that is bypassing your VPN
But if you blow your cover and they link that access point to you, they'll be tracking your physical location - a major security problem. @@axleorange1625 And here is my idea - instead of a "SIM-less phone", one should use a tablet or another GPS- and mobile-less device, to connect to it. Less opportunities for it to leak your identity and location.
Well the video description says "your phone [...] a powerful tracking device", as if we'll learn how to avoid tracking. Then introduces an additional access point that can also be tracked (admittedly, with much fewer ways, compared to a phone ), without elaborating much about that. @@axleorange1625
Thanks, I loved your explanation on this topic and all your written references too... 👍
Hope you don't think she's accurate
Great video!
Thank you for providing the information the general public needs to maintain their anonymity yet getting everything they need from innovation and tech.
I am an atty. "Location tracking" saved my client from false accusations by a former spouse who was involved in a custody matter. She accused him of threatening her when he was miles away. Luckily i was able to convince the detective to go to the big box store where he was shopping at the time. The store security video had him standing in the cashier line. Without the cell "location tracking" the detective wouldn't have gone to the effort.
Granted, it can be helpful for the innocent but I've heard it can be just as useful for the guilty as clever people can set up false tracking locations and physically be somewhere else committing a crime. Your client was fortunate that you got the cop to actually investigate and within the same day, same hour, that's a fortunate client that's gratefully not unjustly prosecuted and banned from seeing his children. Well done atty.
Oh, I thought I replied, but it seems I commented instead!?
@tash17kids Actually it took awhile. Luckily a prosecutor friend from another city gave me the necessary contact info to get the records from the cell company.
Sounds like a defective detective issue, not a location tracking issue.
Wouldn't a receipt of purchase be adequate proof? A credit card receipt would be even better, but even a cash receipt will have the store name, address, and date/time of purchase.
Naomi, you are our privacy fairy godmother. Thank you for your tireless work to educate us!
she’s definitely straight out of Hogwarts. 😊🧙♀️
i agree...but i think Naomi said "hot spot" too many times...now i have Naomis hot spot on my mind...
stop kidding yourself, she's probably a government plant so as to lull you into a false sense of security
NBTV. Naomi I know your a busy lady but I shall ask anyway. Please how do I download a VPN onto a firestick Thank-you in advance ❤.
Bravo!👏
2:20 - This is true!! Once I was walking past a dept. store, and a few minutes later guess what I got an email ad from? 😮
Same here. Walking thru Walmart. Walmart comercials.
Happens all the time even just talking about something out loud or texting somebody about something
Wowww😮😮😮😮😮
When they contact you tell them to piss off
@@stanleyosburn867then they send you commercials on incontinence products or diabetic meds
I'm so glad I found you...what a great video.
I can confirm with a RF signal monitor while my phone is in Aeroplane mode while travelling it will still covertly ping cell towers without my knowledge.
News: Pixel 8's powered-off Find My Device tracking also coming to other Android phones
What does that say about the supposed vulnerability of airplanes to rogue RF signals and the intentional misdirection behind naming it 'airplane mode' ?? We are perpetually lied to and our behaviour manipulated.
@@censorthis-uu6cc if airplanes were vulnerable to cell phone transmissions they would be falling out of the sky everywhere since many people cheat on the rules. The real reason for the rule is more likely the powers that be do not want the extra burden of hundreds of phones in the sky illuminating cell towers for hundreds of miles and using up resources in cell tower processors
Another possibility is what I do. I just use a basic flip phone (not a smart phone) for communication purposes and don’t worry about having any internet connectivity until I am at my destination and use a VPN and the internet connection at the destination.
This is certainly something to consider. Great video!
Excellent stuff. Keep showing up
You didn't mention that 911 service still works even without a SIM card! I haven't had a SIM card in my phone in almost four years.
Then please never come to Germany. Here phones without SIM cannot place emergency calls. By Law.
@@valentinhilbig Stupid law that puts people at risk just to help companies.
😮😮😮😮😮
@@valentinhilbigwhy? Don't many people die because of this?
@@KyleTO7 Probably, been like that since 2009. They claim there are so many false emergency calls, that the real ones are delayed too much. Probably just an excuse, though, haven't been able to find a shred of evidence for it on the net.
Naomi Naomi! I just love your tenacity! Thank you so much! YOU ARE SPECIAL!❤❤❤
Superb work! Thank you and wishing you the best. 😊👍👍
Simple, clear instructions. Thank you.
Absolutely. Never trust mumbo jumbo or murky information.
I use two phones - one is just a simple phone which contains my sim card, for making phone calls. The other I use just like a computer, along with a hot spot, to access the internet - mostly to check emails, and access my bank account.
I'm in Canada and I'm most certainly going to look into this. Thanks Naomi. That was presented very well. Thanks again.
@epytaffskitchenstink Will do. Thanks again. Have great day.
@robinhooper7702 Look into what? Am from Canada to, did I missed something?
@synaestesia-bg3ew I'm to look into purchasing a Hotspot, then log on to the web through a VPN to hopefully have a much more secure connection here in Canada, because what was presented may not be available in Canada.
@synaestesia-bg3ew OH, that is without using your Sim card.
@robinhooper7702 Thanks, that's wonderful. I want to try too.
Great advice. I've been doing this ever since 2018-2019 already :)
Gonna watch this video again to soke up all this info. Thanx
Naomi i tried this setup for over a year and it's more useful as it seems less. Benefits are great and less chatter 🎉
Every heard of capital letters when writing a name?
@@senismarsenis9678 yes, but does it matters for the general comment
Spell much?
Good info to know. Thanks for the video!
THE MAIN PROBLEM: 2FA text verification is a nightmare if you dont have an authorized cell number. try signing up for a new google account for example. it requires a SMS verification, if you try to send that to of the voip numbers it wont work, google will say "this is not an authorized number" (or one of various rewordings of that phrase).
what this means is ultimately with this method you will actually need a 3rd device. likely an anonymously bought refillable burner with a sim which you only use for sms verification
I signed up for my new Gmail account on public library computer and they didn't ask for a phone number for verification. Another thing you can do is use a friend's phone number for those issues
Can you turn that into actual English that people can understand?
@@kenhollandjr1251 2 step verification is when a company requires two items to log in-- both password and a phone number
in 2024, if you are too cheap to have an actual phone number that works, you shouldn't be signing up for 2FA. you can get a $99 android and a $10/month plan these days. It's ok you you are on a fixed income and can't afford a phone and number, but you should Never use 2FA unless you plan to KEEP that number. if you think 2FA is bad because of VOIP lines not working. Set up all your accounts with 2FA and then change your number and see what happens. Most people will lock themselves out of those accounts permanently. 2FA is for people with PERMANENT phone numbers.
@@kenhollandjr1251 If you want to use VoIP phone numbers like the ones Google distributes for free with it's app called Google voice/Phone, each email address/life account you sign up for.
The issue is Google and all (I think all?) the servers giving out free wifi phone numbers requires you to have it associated with an actual phone number someone is paying for. It will be used by Google to verify that you do, in fact, have a paid cell phone plan via TOP texts.
FWIU, as soon as google finds out you're living life with just a google number that's no longer associated with a phone number they'll kick you off your free phone number until you add one.
I am really impressed by this presentation and will definitely be looking into it further. Three cheers Naomi!!!
I hope some of the concerns that are brought up here will be addressed.
Otherwise - good job. You've given us at least a start in the process toward taking control of this issue.
We need to stop cooperating with phone companies screwing us.
I just ran across this channel today and I've subscribed. I'll check out more of your stuff. I've also shared it.
Thanks
thank you, appreciate you helping; I have been on your advise for last four years, due to financial restriction.
Informative as, thank you ❤
What!?! This "siloing" business is EXACTLY what I've always wanted. Hadn't a clue that was possible, much less available. I use a Pixel 6a with GrapheneOS (Mahalo for that tip, btw.). With your video, I could really see myself using this Calyx hotspot AND change from the GrapheneOS ROM to the CalyxOS ROM on my Pixel. I HATE phone calls and messages, but I find mobile DATA very useful. Mahalo for yet another great idea. I don't travel as much as you do, but I may start doing that with a mobile hotspot. Aloha.
do NOT trust Calyx. Go look at who their staff and advocates are. Look deeper. One of their advocates, Techlore, said he thinks digital ID/FIDO for internet usage is a great idea.
You modified your phone...I clicked on this video wondering if ppl were really doing this for privacy or this was a secondary group
I want to modify because I made so many tweaks in.my "settings upon settings upon settings" that it's only a logical answer
Except there's not really a slide bar for "make my settings permanent " haha
If you know what I mean
Mam you are preparing content with lot of research,hats off
But you didn't research how to spell the word Ma'am ? Your spell check did try to save you.
@@Antney946 😃😞
@@Antney946 preconceived perception
@@Antney946 I was about to comment the same thing. Indians often find English challenging. It bugs the hell out of me that they write "mam" when they should write either "madam" or its spoken contraction "ma'am" (two syllable, not one).
@@SGKulkarni It might be helpful if you learn to write English since it's the language used here.
Great video!
Thank you so much for exploring this.
I really didnt know there were alternatives to sim usage
Thank you Naomi!! Amazing work, as always!
Peace and love from Guadalupe!
I can't believe your submarine sailor picture! I have the original recruitment pamphlet thanks for the vid!
GREAT content! Thank You!!
Thanks again Naomi. Very Inspirational! Will implenent this.
Excellent video, very informative, very helpful. Thank you!
Bravo! Well presented!
When you download a Major App... like Google... is the PERMISSIONS acceptance document, it says you give them the right to turn on (access) your mic or camera whenever they want... and if you say NO to anything THEY WANT... a message pops up and says your phone may not work as expected... like they will deliberately sabotage your phone if you don't OBEY...
She's informative & the epitome of comeliness.
Of course she is. She's an actress playing a cybersecurity host for a corporate UA-cam channel.
😅@@ShaferHart
Comely maiden
Excellent and useful video!!!
You are an answer yo my prayer. The more we can no to work on keeping our privacy the better!!!!!
For emergency situations you could leave the sim taped to the inside cover of your phone and then just drop it in when needed when all other connectivity is gone. :O)
but you still need to have a contract or prepaid card to make a call or use mobile data, so its sort of pointless. Maybe buy the prepaid card and tape the sim to that and keep it somewhere you can access it if need be, such as the glove box of the car. or you can put both the cards in a baggie. Other than that paying for cell phone service without the technology to access it seems totally a waste of $$$
There is also risk on regular android and iPhones tracking anyhow from the telemetry and the never off location and wifi scanning, even when powered off, and then sending that data to home base as soon as it gets a connection.
This was demonstrated I believe by a Fox reporter that walked around with a phone that was powered off and then captured the data that it transmitted once connected.
Yeah I was going to say the same. And airplane mode is effectively useless. The phone gets desperate and actually makes more ping attempts. I actually love all her advice, but the endpoint privacy upsides are not as significant as she thinks.
@@dutchfpv7010 I know (or pretty sure) she uses Graphene OS or some other open source OS, that is really the only way you can control a smart phone to not use telemetry, wifi scan, and NFC.
She just doesn’t say that in the video, possibly leading people to think this technique will give any sort of privacy on a regular Google (or any other mainstream commercial android) or Apple device.
It will give some, but not from big tech.
Even with a privacy OS you can screw yourself with contact lists, bad web surfing decisions, using and signing in to social apps….It’s a web of spying and tracking these days.
I’m even trying to locate and remove the sim from my vehicle, that’s how much of no one’s business it is where I go.
She said she puts it in a portable Faraday bag whilst she's on the move and not using it!🙄😂
@@jamiecurran3544 yes, then as soon as you take it out to use it a connection is made and current info/location is sent. Still forming somewhat of a location pattern or history.
🤣
@@jamesready5 I was thinking the exact same thing!😂, it just seems like a ball ache having to carry round extra piece of tech/weight!🙄😂👍
You are wonderful and thank you.
Nice! Thanks!
Thank you for the informations and very good presentation. It's very helpfull. I'll think about to leave my eSIM out of the iPhone.
I had no idea the SIM card was a full computer in itself, wow! I thought it just linked you to your cellular network carrier. I kind of want to know what a filesystem dump of a SIM card would look like.
Yep!
But can it run Minecraft?
I'm not too sure...
It’s not
@@echo-hotel You haven't watched the whole video yet.
@@echo-hotel SIM cards are indeed smart cards (= cards with an embedded computer system) on which the SIM/USIM software runs.
@@hmpeter indeed but that doesn't make them a "full computer". more like an advanced calculator
Naomi, I love your camera presence, your clarity and ability to talk and keep the viewer's interest is great - I wish I could do that. Did you train to do that or is it natural? I listened to the whole thing even though if I was location tracked 'they' would find out I don't go anywhere or make or get and calls. Literally, I have PAYG and spend about £20 a year (if that)! 😅
I really like your approach.
Its an interesting discussion. It just came to my mind emediately that in many many criminal cases, this tracking informations lead to the criminal or finding a missing person. The records of your phone are also used in court to proof your alibi or where you have been during the insident. It can be used for good. But it also can be used for bad.
So leave your phone at home when you go breaking and entering. Then you can just say “look! I was home all night.”
@@python27au jury will disregard
Awesome strategy!
As a very famous First Officer was always saying "Fascinating!!" That was a lot to take in.
We are not like most people. We do not have smart phones. Just simple flip phones. We do not use them for anything but phone calls (duh!) and basic texting. We don't store anything but phone numbers in them. No camera usage. No GPS usage. No internet usage. Nothing. If and when we want to go quiet, we just pull the batteries out and we are completely dark.
With all of that in mind, having a hot spot and vpn is still a few extra levels of security that we may well consider. We already have VPN services as well as military grade (Military contractor) security for our computers. So, why not add the phones. You presented an interesting and informative video. Thank you.
@Steveforbes8287 Ironically, I’ve been asking myself that exact same question. How can a privacy concerned civilian obtain military grade security for our cell phones and computers. You mentioned that you get it through a military contractor. Is that something I could set up for me and my whole family?? And if so, could you make a referral possibly if I send you my email address?? Many thanks, Christina
How old is your flip phone? My last two flips are connected to the internet via sim. I have to go back to my old 3g phone that doesn't have a sim.
@@MountainFisher That's odd, my 3g & 2g phones had sim's. (Full size, as in credit card size, in my original Nokia)
I would assume the military over there have approved mobiles, get yourself one of them.
Dude you're Not listening.
All those things can be turned ON Remotely.
Including GPS.
But you you can still be tracked by cell Tower TRIANGULATION.
AND you list of CONTACTS?
That's very useful to them.
You still use a SIM to make simple calls. So they know WHO you are and ALL your contacts and what you do........
So not having a Smart phone mean YOU have less functionality.
But the Gov spies have everything they need, just the same.........
That's really cool! I wish there was something like this in Europe
Thank you.
Regards,
Geoff. Reeks
The best content about privacy, I love this channel!
All the best
Rob braxman is very knowledgeable about mobile security
Thank you so much Naomi. I really appreciate your dedication to privacy. Your incredible passion on this topic is so refreshing. As always thank you for given us options that we did not know we had. It’s great that you clearly explain the positive and negative ramifications of these options you masterfully present. I love the privacy nerds humor 😊. Please keep the great content coming!
Brilliant and valuable news.
Great video about important topic..
Thank you very much for all your efforts Naomi!!! You're doing a great work with these videos. 🦅🙏🏽🇺🇸
Great post Naomi. Have a great weekend ahead. You are so appreciated 💛
Great info!
7:10 VPNs don't stop so-called "snooping." At best it hides your activity from your ISP/phone service provider, but outside of the VPN your data is still out in the open. The encryption is only between your device, and the VPN server. Past that it's not encrypted, then VPN becomes your ISP and can see what you're doing, since all a VPN really does is make it seem like your data is coming from a different IP address (a different service) than the one you're actually using. Once you login to your services like email, social media, apps, etc... they all track you.
i think using VPN with a service like Protonmail to another correspondent using Protonmail is pretty secure but using Protonmail with it's inherent encryption and VPN to say Gmail ...you lose the security at the gmail server. Correct me if i am wrong
That was our question. When you sign up for VPN, don't they then have access to your communication? Also , I have been told that every app on your phone can get access to communications and transactions on your phone. Is this true?
Ouch, Lol, so much for all this bull video, geez.
@@saus675 no, what this video does do is protect phone activity (and interactivity) from your phone provider. separating your sim from the wireless device.
To further dilute location tracking, form a group and cycle the hot spots amongst the members on an irregular basis. The tracking will be an average of all the participants.
yes, but couldn't it also tie you all together - act as fomites or contagions for all of you? One person could put all others at risk, I'd think.
Excellent video - I wish there was slightly more coverage about what people who do NOT live in the US can do. I'm sure it is a fairly large population of security minded people. Also - heard there was a video you did about how to spoof the companies that insist on a 'real' sim for sending OTPs. I have a couple of institutions in the US that do that and that is the only reason I have been maintaining a MINT number (it roams outside the US permanently so I can receive text messages on it). I'd love to have a way around that.
Very informative
It also listens in on our conversations, if some sources are to be believed, and oh what fun that little nugget can be when carrying on a merry conversation!
remove that little nugget from the phone. problem solved. works better than turning down the mic or other quick fixes. Plus you can access wifi wherever wifi is available. it will look and feel like a phone and only you will know better
Didn't know about Nick before but now he is my hero too ❤
false hero. not sure that he or his staff or his advocates/friends can be trusted.
ultimate guide nice one 👍 😎
Thank you.
Good stuff, thank you.
For more than half my life to date, there were no cell phones. We all went everywhere without needing to have immediate access to a phone, and we were not afraid. I frequently leave my phone at home as if it was a landline screwed to the wall. I guess that's why phone companies have gone to the expense of removing pay phones which they could have left in place -- to try to force everyone to carry a tracking / spying device. I still choose to leave my phone at home unless I am travelling a long distance or in a remote area, or expect a call. When my phone is with me, it is kept where it could not take a photo, which I realize only tackles one spying avenue. I do not have data on my phone and I never go online with it, although I don't know how to prevent that from happening by remote control.
I think you'll find payphones were removed because they weren't generating enough income to pay for their maintenance...
@@kwakagregI can’t imagine having to use a pay phone during the time of Covid or any other time these days As a 72 year old I have no problem with being tracked by my cell phone; I don’t plan to commit any crimes and if something happens to me while I am outside my home, my phone is available for me to contact emergency and loved ones to tell them where I am.
Having a cell phone could be a life saver. Parents have used the cell phones to keep track of their kids when they’re out and about with friends, kids have used the cell phone’s to call for help while hiding under a desk during a mass shooting. The elderly with memory loss can benefit from having a cell phone in their possession when they are out alone to call a loved one or for police to find them if lost. I can go on and on about the benefits of having a cell phone in one’s possession. People who want to keep their whereabouts a secret may have good reasons for leaving their cell phones at home.
To be real, cell phones were never really about the user. It's a tracking/profile tool used by government and a goldmine for private companies who buy and sell personal information/metadata for advertising.
I was having a conversation with a coworker the other day. He has never heard of the name Edward Snowden.
@@jimthrowaway sorry urban myth. The release chute was not connected to the storage box. Was never more in the coin release than what was put in. Yes they were sometimes attacked and the coin box removed but not very often. We actually found one in Coogee that had been dug up and wired to a nearby flat. They all had Meters on them and this box was making a lot of calls that weren't covered by the income.
your explanations are so clear and easy to follow, thanks for putting great work into your scripts and presentation
Love your channel
thanks for sharing. I never knew there were 3 different cpu's. very cool
Amazing information you just dropped on us. I did know a little bit about this topic of online personal info being sold. But the separate components that track our every move are mad freaky in this dystopian future. Thanks for adding such valuable information for us the consumers
The timing of this video, I was just having this conversation on Survival Lilly's channel. The bank "made" her download an app she didn't want, and one commenter suggested a second phone, saying they use one with a $10 sim. I asked if the phone would even need a sim if connected to a hot spot? I was thinking the first phone could be used as the hot spot.
Only if you needed a second phone number. Other wise it works like a laptop. No Sim needed just wifi or mobile Hotspot.
you can use most apps (except for phone and text messaging really) without the need for a sim card. You just need access to wifi
💖Thank you for all the knowledge. You made a magnificient video!
Brilliant video, I don't use a smart phone just plain old Razr, does what i want
🧡 how you presented info down to chapters in the transcript. Very user friendly.
👍👍
Really good learning video ! I'm afraid that it's valid only for the USA, not worldwide.
By the way, have you heard about a similar solution in another country, EU, SEA, LATAM ?
Most of it definitely does apply to EU
Just brilliant! :)👍👍👍
Thanks
Recently my telco enabled WiFi calling, so I can put my phone in flight mode and still perform regular phone calls without using a third party app for voice. If your in a cellular hole this can be really useful, once a local telco offered a personal cellular cell box, that you could install at home, however that is no longer available, so being able to use WiFi to do the same is really nice. Now all I have to do is convince my brother to do so as calls from his house regularly regularly descend down the gurgler/toilet/drain.
One downside, I used to use flight mode to restrict my phone to SMS's (as in Apple messages), with no voice, however I can no longer do that as calls now come straight through, maybe I need something like a pi-hole to nuke that traffic when desired.
Naomi, You are my hero! This is by far the best video of yours I’ve watched so far! I had no idea that Calyx Institute was even doing all of this. I so* enjoy watching all of your videos and have learned a ton from you and from Josh Summers on his channel called All Things Secured. I cannot express my gratitude enough!
I love your videos. Just realized I was not subscribed. So sorry for that! Gonna keep following whats coming next for privacy as companies are constantly creating new methods to keep tracking and using us.
Thanks for subbing!
Subscribed,hope the rest of the content is as interesting.
Hot tip! - When you plan to rob a bank, leave your phone at home : )
Your car will record where you went, nice try.
Jokes on you my cars from the 80s@@cheerbeerification
Hell I leave my phone at home even when I'm committing vandalism!
OOPS.....
“Join the Revolution “, my kind of guy!
no blind trust. he and his company, software, and products could very well be honey traps. He and his staff are far left - and that can sometimes be good (rebellious and independent), but can as often be bad (stupid enough to think social justice movements are true justice). UA-camr Techlore, who love CalyxOS and its staff, has said in a video that he is all for mandatory logging into internet every time using biometrics/digital ID and that anonymity is dangerous. Techlore talks out of both sides of his mouth.