Tor Did NOT Get Hacked, UP Smartphone Looks Like a Honeypot
Вставка
- Опубліковано 1 жов 2023
- In this video I discuss the recent false positive windows defender caused for the Tor browser, and the Unplugged Smartphone developed by Eric Prince and the developer of Pegasus spyware. It runs a proprietary version of Android as well as proprietary messaging, VPN, antivirus apps, and more. Due to the phones proprietary nature with software that you can't see the source code of, modify, and run as you want I would not recommend it.
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF - Наука та технологія
Trust him bro. You don't trust the guy who made a way to hack phones and sold it to the glowies? Come on bro trust him bro
Once you work for the firm, you always work for the firm. Sure you can take time off, but you’re a member for life
@@MidlifeRenaissanceManYep. Even if your family has them, you cannot be trusted
Trust who? This guy? The hacker? I trust neither. All this guy has done is make assumptions about a phone he doesn't have. That's the point I was trying to make. He is guessing at best. There is no phone that is free from being spied on.
Lmao…. “Trust him bro”…. This guy sounds like a mouth piece for the nsa.
"Trust me bro.... you ain't got a choice!" Ha-ha-ha
"The Patriot Act was well intentioned"
I just about got blinded by the glow.
🤣
You're looking at it wrong. From your point of view (good for the citizens) it wasn't. From their perspective (Good for spying on citizens) It was a resounding success and lived up to it's intentions.
@@OmniDan26lmao
lmao
🤣🤣🤣🤣
Guy who creates spyware sells a phone with spyware preinstalled. What a surprise 🤣
Thanks for 1k!
Pretty much google
Yea shocking.
@@YAKUB_IHATEHUMANSsounds like copium in that instance.
How can we trust a person behind Pegasus that it’s really meant to be secure?
Hmm so it’s just a regular android phone?
@@quintrapnell3605still watching but im guessing with a bunch of closed source proprietary software?
as soon as he said yes to proprietary, he literally made it crystal clear that this is a honeypot
fun fact about Erik Prince, he is Betsy devos' younger brother and the founder of blackwater PMC
There is no security by obscurity
Saying anti-virus earlier was as bad. That's a sticking plaster, if you have confidence in your security you shouldn't need it.
Is it really self reflection? To me it reads like "oh I worked so so hard in the game it deteriorated my mental health and made me do mistakes, woe is me!" It's like he's trying to use that as an excuse, it's only 10% apology, 90% emotional manipulation by making himself look like a victim of the situation.
ua-cam.com/video/aG5Y3c8NRho/v-deo.html.BREAKALAGE BITCH
Especially since CalyxOS and GrapheneOS are already fully viable complete privacy options, its so obvious his proprietary option is a full honeypot.
right wing grifters always try to sell you on some absolute shite like this anyways, nothing new
@@robyee3325 "the phone that protects your freedom"
if only the grapheneos developer wasn't such a bad person
@@_eyawho cares, you're not trying to be his friend, you're using his code
@@_eya If I have to only use software from good people, I would not be using the internet.
We're living in the 'Post-Trust' era.
I don't even trust myself, or my family.
Your family has been compromised. They are sending your information to the feds.
When you get to this level wtf is the point of anything? Might as well go to Sweden and make an appointment with a self delete booth.
@@whannabiI too don’t trust myself or my family. I think I stubbed my toe when I should have turned on the light in the dark hallway. Or maybe that time I burned my canna butter through a hole in a container because I forgot to wait for it to cool.
And my ‘Mom’ always calls me asking me what I am doing and I don’t get it! What, is she an agent reporting my movements back to the glowiens? 👽
All I am saying is the tinfoil hat stays on. 🤡
@@whannabiWho says?
You shouldn't put 100% trust into anyone, much less yourself. Intuition loves to lead us astray.
literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.
This phone glows brighter than the sun.
The Glider speaks the truth. Gamma +5
brighter than 3C 273
Can someone explain that to me? I want to understand the lingo, thankssss
@@kalef1234look up cia glow
@@kalef1234 It's slang originally coined by the schizophrenic programmer Terry A. Davis. His original term was "glow in the dark CIA s" but the term glowie has since been generalized to anyone associated with a federal agency in general and an intelligence agency specifically.
If you can't read the code, always assume the code is spying on you. And as someone who works/worked in the government he should know that...
He knows it
Even if you can read the code, it's frequently spying on you. The top contributor to the Xen hypervisor (used by AWS and GCP) was the NSA for a while.
Their are two sides of the argument. That also means that hackers can't access vulnerabilities. Again I am not defending closed source.
@@MODEST500well if hackers can find vunerabilities, security researchers can too. i would argue that open source makes it easier for the researchers to help fix it.
@@MODEST500 Decompilers are a thing. It may take lots of works, but they will figure out the specific lines of codes if there's motivation to do so.
That phone would totally NOT send all your data directly to the NSA!
Just trust the guy who looks like a B-movie villain!
He acts the part too. Few men have as many war crimes under his belt.
If a phone is not made with a reprogramable FPGA on a risc-v architecture with a IMEI hopper I don't want it for privacy use.
@@interstellarsurfer what crimes??
>Uses Tor for privacy
>Also uses Windows which sends telemetry back to Bill Gates every time you try to uninstall Microsoft Edge
You can't have both.
Switched to the fat penguin os thanks to muta. it was the best choice I've ever made. hope more people stop using windows
I wish i could quit windows too
You're right on some level, however blocking incoming and outgoing net traffic on a domain or IP basis is trivial these days
Mammon.exe
@@star_ducki want to quit windows too, but i don't have storage to backup all my things and reinstall everything.
"it's android based but it's all our code"
That's like saying "it's got an AMD CPU but it's all our hardware"
I wonder what moisturizer he uses, his skin is absolutely glowing!
It's a PLC based Stuxnet moisturizer
Uranium
he should use sodium and water as his moisturizer
Radium is brighter
Android is open source.
This only works with people who aren't tech savvy.
The irony is that people who buy these phones need to pay 10$ a month just to be ' anonymous ' .However they'll pay that fee with their bank account . So those same monthly payments makes it rather convenient for law agencies to check the phone owner's identity trough that bank account.
Haha
Lmao, that's is SO on point😂😂🤣🤣
They aren't reading or seeing what's on your phone....the bank accounts another battle
@@blakeunage8058 No, I mean that the purchase of such a phone means 9 out of 10 times one wants to spend money to have dodgy conversations. So it's an indicator for further investigation. A contract only bring unwanted attentions
Closed source: walk towards the exit
Rolled their own crypto: run towards the exit
Unvaxxed dating app: u wot m8
wot?
This guy is the most sane tech youtuber.
most based* tech youtuber
I'm scared that I don't understand where he lies on the political compass. Like perfect libertarian center
Frfr , he even touches grass daily
@@UrbanistBloomsspoke like a true redditor
@@UrbanistBloomsno one cares
"Boomer mercenary glowie repacks Android on a phone and slaps 'proprietary' as a feature. "
>Buy anti-spyware phone
>Open it up
>Spyware inside
I literally stopped the video to laugh for 5 minutes straight... "if you dont want to be spied on by this navy seal, black water, ex mossad, guy who hired the pegasus guy and now recently your new bestfriend..." maybe not that exact wording but Im literally dying from laughing so hard... thanks Kenny for being skeptical and prevent someone falling for something that has NOT be proven to be safe.... by hiding behind "proprietary" software... WHY NOT let the code be audited IF they ARE safe tho... just imagine Graphene OS changing policy from Open to Closed... people would run faster than the road runner the F away, as they should.
#trustmebro
@@specthegod Okay bro. I trust you to do weird stuff with my data.
@@propsekgamerprofile picture checks out
It's made and sold for a more trusting clientele. lol
"Offensive cyber virus" has the same vibe as "supercomputer-trained neural network artificial intelligence" in nvidia's recent marketing
What? Are you forgetting about all the defensive LAN viruses in the wild?
I'll do you one better: "Internet death machine" as 4chan was described
You forget that his security was trained by backpropagating quantum retro-encabulators
Rule #7: Always be specific when you lie.
Rule #36: If it feels like you’re being played, you probably are.
Rule #3: Never believe what you are told. Double-check.
Rule #34: when all else fails, divert them with fap.
What book is this from?
NCIS. Agent Gibbs' rules
@@Jinnyfir 👍
@@IDvfyferengi rules of acquisition
This is why we need to educate people instead of stomping on them because they never got tought how things actually work since all they know is because of ads and marketing.
Problem that economics system is not interested in it. It prevents milking. Stupid customer is good customer.
@@inevespace doesnt matter, its still failing, this socialistic version of "free markets" lol
showing how to build your own android OS would be a good video
Absolutely this. It would also expose every hack company trying to sell you some "PatriotPhone" or something.
Need Libre podcast asap.
Ah yes, this is only the 3rd or the 4th "totally not a honeypot" phone, I'm sure this will not be revealed as a honeypot like the others
It's actually 100d chess darwinian criminal opsec training; if you catch all the dumb ones the rest will learn eventually
Did that freedom phone nonsense turn out to be malicious as far as we know? It seemed like it was just some scheme by a silicon valley used car salesman to upsell a lazy android bundle as something special. I certainly wouldn't trust them but it didn't seem like they'd put the effort in to do more than that even if they wanted to.
Imagine overpaying for a honeypot when you could have some crisp open source OS on a pixel at 3/4 or less the cost.
Yup. Got a pinephone as my backup/hacker phone. Multiple OS's and I can pull the battery out and sim card. ;)
🤔 I wanna do this sometime. Any advice, recommendations, tutorials?
@@josephbrandenburg4373 Mental outlaw has a tutorial on installing Graphene OS. You need a Google Pixel phone for it, you can get a refurbed 6a for like $150 or less, or go for something better, whatever suits your needs.
That would be my first recommendation if you want something DIY, simple and with most of the perks. It's also cheap and a fun project, at the very least. I used my old Pixel 4 for it.
Good luck tho, there are a few solutions and they are pretty worthwhile if this is something you think you'll care about
@@Rock_Appreciator i guess you posted a link or something and yew tube boinked it
I just looked into the phone a bit further and the CEO, the guy on that clip claims that phone includes IMEI spoofing to prevent being tracked which highly illegal and would mean that the wouldn't be legal in the US due to the phones not being FCC complaint. also I'm pretty sure that the original idea was closer to the freedom phone as the name that he originally planned on using was the "REDPILL PHONE" and yes it was stylized in all caps. also the phone has received backing from several silicon valley venture capital firms which I'd assume is why he renamed the phone.
Yeah I heard about the Red pill phone thing in an older news article about this phone but couldn't find an original source for it. I think the same article said they had a server hosting their software on a ship traveling around international waters in an undisclosed location connected to starlink satellite Internet to be extra super secure, but they still can't show us the source code.
The Q phone ???
@@MentalOutlaw security by obscurity is not real, it doesn't matter what they are doing with the source code it might as well be malware if we can't see it.
@@Entropy67especially considering Ghidra exists, it's not so easy everyone can reverse engineer software binaries now but anyone with a certain amount of knowledge can.
@@MentalOutlawYup, and it's a ship that they themselves built to be secure against outside forces trying to pick up on signals and data. The ship has a 10,000 qubit quantum computer on board, also built by them, none of the parts were made in China, all hand made quantum parts by tool man Joe here in a garage.
Their independent audit is a joke. A rubber stamp from pwc consultant that says "trust us we tested with secure standards"
The dude can't stop rubbing his hands together. I wonder who could be behind this?
Just a happy merchant selling his wares.
Hey guise, let's cool it with the personal opinions about a group of people who have been historically blamed for things that nobody is allow to talk about. I mean just because images of "Gendarmerie seizes historical Torah in Turkey’s Mus" seem to indicate something, it's nothing we need to concern ourselves with.
@@interstellarsurfer🎩👃
The Trust Me BrOS
With an LGBTFO meet up app
Underrated comment fr
We got this new phone. We promise its not a government honeypot. BTW, its great for the unvaccinated and maga supporters. Don't tread on me! 2A! lol
They’ll be handing them out for free to all of those guys at rallies, plus drug dealers etc etc hahaha
Of course it’s great for them, they’re the exact sort of sucker who pays $1000 for the privilege and buys the shit a guy like Erik fucking Prince is selling. If you know anything about Prince, you know exactly what this is, a low effort Freedom Phone 2.0 for the guy who goes to gun shows. If you don’t know anything about Erik Prince, his “reputation,” or how he got that reputation, I suggest you look into it. Anyone willing to have him on their show isn’t a serious person. Anyone willing to let Prince come on their show so he can hawk products to their audience isn’t a trustworthy person, much less a reliable source of information. He’s not just an incompetent clown. He’s an evil, incompetent clown. A guy who frequently elicits moral objections among mercenaries ain’t a guy you want to do business with.
finally a phone for the real citizens of the US!
😂
Also remember to water The tree of liberty, fellow patriots
Lmao don't act like the government gives a fuck about either of those 2 groups
"One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them" - Shannon's Maxim. Proprietary as security means worse security.
Being spied on by those phones is the least of your worries. You'll get lethal radiation poisoning within days from the intensity of the glow.
What I hear is that some of the TOR exit nodes that are compromised as well as many of the "Markets."
It's been that way for some time. Anyone can run an exit node.
The point of multiple relays is no one knows both ends. Potentially compromised if one operator controls enough nodes. And from exit node to endpoint should still be encrypted.
You absolutely need to expect exit nodes to be hostile. Not that long ago, exit nodes were downgrading connections to market sites from HTTPS to plaintext HTTP and rewriting cryptocurrency addresses in the traffic to addresses they controlled. End-to-end encryption is as critical over Tor as any other transport.
Debian iso was flagged by defender yesterday... My friend told me when he tried to download it.
Microsoft probably doesn't want you to leave the big tech ecosystem. Anyways, always verify the iso.
You all have no clue how big this new cyber warfare threats are . Govts probably trying to nip problem actors in the butt before they emerge …
Comcast sent out piracy notices for people downloading Ubuntu with a torrent 😂
DEEPFAKE GETTING BETTER GOOD JOB MENTAL 🤖🔥🤖🔥🤖
💀💀💀
That phone is a whole beehive 💀
I see you're trying to get sound treatment for that room. An area rug would do wonders. Also, those triangular foam pieces are more for Bass. Acoustic panels are better for midrange / high range sound reflecting off of flat surfaces.
I'm probably just gonna end up making my own from Rockwool next time I go to home Depot
@@MentalOutlaw Learn about mycology before spinning your own. Aflatoxins are much more common than the healthscare system would have us believe. Source: Trust me bro and also Cardiac Aspergilloma.
Just make a fort under your favorite cushions and blankets. Great acoustics, comfy, totally invisible to ghosts and monsters
@@MentalOutlaw Put your jerseys up the wall
@@MentalOutlawYou can buy eggs in bulk and use the foam that they come in. It performs almost the same as those fancy foam panels!
He looks like a fed
yea defiantly.
The idea that his CTO is the creator of the pegasus malware but that he just wanted to do a support service. If we believe that, which we shouldn't, but if we do anyway, their CTO found a zero click exploit and intended to publish it to the public without informing the vendors, to provide it support. That is like finding a gas leak in a house and deciding to lit the fire because the people might want some marshmallows.
What a funny coincidence. I re installed Tor today because I have a new Set Up and it immediately flagged Tor and I was slightly confused and just tapped yeah wanna keep it
Your mistake was your choice of OS
I happened to recently compile tor and obfs4proxy from source a couple of days ago, those dont get flagged at all.
Must just be a windows thing, and not every release.
TOR was made by naval research laboratory, aka if the NSA ever wanted to find you on it they could, it was never a question of if it was possible as it was possible since the inception of TOR, rather it was a question of how much resources ie compute they wanted to allocate to figuring out who you were aka are you an important enough target to allocate X amount of $$ to compute to get the job done, that’s it. Anyone trying to say anything else doesn’t know what they are talking about and needs to read up on mathematics, cryptography and physics and fill in the gaps in the right places aka know what current technology is and what advances have been made in certain fields of mathematics or rather lack of published papers after certain dates, like its truly not hard to piece it together…. Just like with the building of the atomic bomb, all of sudden America just stops publishing papers on XYZ it wasn’t that hard for any other country to figure out what the US was doing during that time… same thing can be done with today’s technologies races…. Cheers
@@metatron5199the source code is open source. You’ll be able to see if the NSA is fucking with you if they could. But they can’t unless they use a deanonomymising tor exit node or if you visit a domain that they control which has malware on it.
@@metatron5199 it was made by the government. clearly, it glows in the dark and SPIES on you, whether or not it is open source!
while talking about specs (~22m into the video), you state that the cpu may be more secure than google or exynos chips because its using arm cores, I believe the cpu listed there is the mediatek dimensity 8050 (same specs), furthermore both google and exynos base their chips off arm cores
mental outlaw lowkey mocking windows users by saying "the gov didn't hack tor" despite the gov spying on them as is regardless
Lol they just set up the relay servers .
Who the hell would buy a "privacy phone" from the founder of a private militia that commits war crimes?
Ackshually..... Private militia does "war" on the behalf of governments.
"It's a private company, it can do whatever they want" was invented during Nuremberg trials. :D
You've been putting out bangers recently keep it up!
@@KGBMajorValeriP your profile screams delusional communist, but it's not a problem
you kind of gloss over this in the video but graphene OS is actually going to be one of the most secure options you can find because you can have a fully trusted software stack
Secure from trusted isn't exactly a logical conclusion. Although most secure is synonymous with unsecure, so perhaps you're technically accurate.
@@Mr.Beauregarde he means you can enroll your own signing keys in the bootloader on the phone so it only boots your firmware. It's just another layer of defence
@@marcogenovesi8570Is there anything actually stopping somebody from doing this with Calyx?
>Don't trust big tech
>"The PATRIOT Act was well intentioned"
50,000 roentgens of radiation from that glow
"Do you love free speech but hate free software"
Laughing so hard right now
They managed to get that domain in 2023, impressive. That must not have been cheap.
You don't say. They wouldn't exactly be short on cash if they can afford to be working with the Pegasus boys.
My bioluminescence radar is going nuts, I mean I'm seeing levels never registered before
Luke Smith always keeps us up to date! Thank you Luke Smith for doing everything for the community! ❤
Luke Smith is here to deliver smiles
he's a clown, but his linux and tor takes are good.
@@yeetyeet7070elaborate?
Is he still simping for eastern orthodox Christianity?
@@CarrotConsumer he's simping for a terrorist
Well, at the point of him saying "propietary" my trust went from 1% to 0%
Tbh if you are being very privacy oriented… there should be no AV and def dont run windows…
Or just don't use a computer.
@@thestig007Dunno dude, using proprietary software and trying to maintain privacy at the same time seems really dumb to me, as was explained in the video
@@thestig007 That's Industrial Society and Its Future tier right there.
This is going to be ANOM but instead of the cops doing it, it will be a private company charging them to access the data.
The guy's body language screams deception.
The Glowiest Glowie To Ever Glow Glowlingly, Glowed Again? I am SHOCKED, SHOCKED I tell you.
Classic case of: Solution Looking For a Problem.
This guy had a strange speech pattern and body language for someone being honest. Hes holding back something major. A few dupers delight smirks too. Wouldn't use this phone in a million years.
It's $949 for a Chinese clone phone with all proprietary firmware software all redflags
Great video as usually. Please never stop puplition this educational / infomational videos. Great job.
Probably just another subtle way Microsoft tries to force people to use Edge.
Edge sucks btw lol
"We wouldnt build pacemakers that could be hacked" "Dude trust us bro" "Governments surely wouldnt want control over the lives of their citizens"
Remember the attack on the Linux kernel by that US university?
They didn't catch those patches and they know the codebase.
If Tor devs were compromised you can be certain that the patch that does it will be an attack like that. It does not make any sense to be blatant when you're attacking Tor when the entire point is to get access to the continuous use of that service.
Tor hasn’t worked for me for the last 3 days, I still couldn’t understand what was going on, I used different bridges, etc. It didn’t even occur to me that Windows Defender blocked it until I looked at it myself, and usually it reports that it’s blocking something, but here it’s just a block and no notification, thanks for saying.
The website even reads like theyre copsplaining something to you. Like theyre saying a whole lot of words but the words have absolutely no meaning and skirt around the entire premise of the situation.
I just want a couple hours of Kenny ripping on Erik Prince
MO is FED confirmed NOD
Egads man, you may be on to something! I will up the ante with the vague inference he may be a German National Pigeon Society operative, commissioning all German Pigeons to spy for the Nazis.
I hope someone has already asked them for the source code for their open source-derived 'proprietary' operating system, to see if they are complying with its license.
Everything he says about supply chain and proprietary screams 'I don't know what I'm talking about'. The interviewer unwittingly hits the mark when he responds with 'incredible', these claims have no credibility at all.
The $10/month to guarantee data privacy sounds like a protection fee
No wonder they can talk with signal with their messaging app. Their FAQ says that they use matrix so they just using bridge to enable that. FOSS in spyware package sounds about right.
What do u mean??
UP phone is a honeypot for pay-triots.
It is much better than this😏
Probably the phone itself is no less secure than any other device in its vicinity🤣
@@goiterlanternbaseyea fr no function is really secure its just how far do you want to take it
I like your level of detail but these are the only videos I watch on 1.75 speed, don't do the typical youtube cuts but.. yeah
Thanks for the content
Lol running tor on windows
Also lol, running Goldschlag code. Try not to hate me for that, I can't seem to stop playing where's Walderman.
>Glow Prince: "nah bruh, you don't need signal - we have our own proprietary app for that. Trust me, bro - we'll never sell your info like we sold our bodies when I was still fighting age"
Ai model looking clean
Your UA-cam really growing up, don't stop grinding
In an ideal world, shouldn't all software be open-source to ensure safety through transparency?
That phone smells like a honey pot.
🐽
that guy gives me 99.99% a glowie vibe. I would not trust, trust me guy. this is absolutely a FBI / CIA back door. DO NOT BUY THIS. But funny for them, nobody has the money to spend so much on a new phone from an Unknown company lol anybody would spent that kind of money of a legit company haha
That sounds like something they would say when it actually was compromised.
Thanks for that, I was kinda worried
I spend 99 percent of my time in Linux but I need to use Windows for University. A lot of the programs they use run like rubbish in a VM and Wine etc. If I wanted to ensure privacy and use Tor I would certainly not be running it in Windows. Do they not realize the point of Tor is completely lost when running it in Windows? I can't wait for the day I can delete my Windows drive but for now it can stay air gapped and used when absolutely essential to my work.
It depends who you're hiding from I guess.
Circumvent region-blocking?
Just got home and theres a MentalOutlaw vid??? Nice 👍
Glowing brighter than the unmatched power of the sun
Thanks MO, keep up the great work.
tor is already hacked through exit nodes - no hacking of tor browser needed
Exit nodes only know where the request is going, not it's origin. You need an entry node to match time/date stamps otherwise it's a random request from somewhere in the world.
@@sloppyfloppy79 source sophos says: Bad exit nodes are entirely possible then, and bad news if they exist, but how do we find them?
Chloe set up a fake website with a Bitcoin theme, downloaded a complete list of exit nodes and then logged in to the honeypot site multiple times via Tor, using a different exit node and a unique password each time.
Crucially the usernames and passwords were sent over regular HTTP rather than encrypted HTTPS so that when Tor’s layers of encryption were peeled back they were visible in the stream of traffic.
If the login attempts had gone unobserved and unabused then the total number of website visits and log in attempts recorded by the honeypot should have matched the number performed by Chloe exactly.
They didn’t.
After a month of testing there were over 600 unexplained page visits, 12 failed log-in attempts and 16 successful ones that hadn’t come from Chloe.
The passwords were not stored anywhere and were far too difficult to guess so if they were indeed stolen, they were stolen by somebody snooping on-the-wire.
Anyone can set up an exit node and because it’s the place where traffic is decrypted, anyone who runs an exit node can read the traffic passing through it.
Just give me a phone with no camera at all. With a microphone that I can either physically and or digitally mute. A phone that doesn’t spy on me and collect data/track me.
A smart phone that’s actually smart and innovative. With new tech hardware and software. A hardy, tough phone than can take a beating. A more ergonomic shaped phone. Not every phone has to be a thin rectangle.
I have so many cool ideas….
A phone that was designed to fit my hand like a glove, a phone that does what all the basics, but that is not too basic, like a dumb phone. A phone that doesn't emit anything harmful. A phone with a screen/display that doesn't negatively affect your eyes.
Most phones are literally the same. A thin rectangle with a camera and a touchscreen. They all use the same handful of OSs/software. Literally no hardware innovation.
just like other industries, the mega corpos like apple, samsung, etc. are all owned by the same ppl, the globohomos looking to do whatever evil thing it is they are doing.
Wheres the creativity? wheres the innovation??
It's almost impossible to compete in the phone sector. will you create your own chips? they wont allow you to. What network will your phone connect to? they wont let you connect.
Free ppl arent allowed to compete in certain industries, this is one of them. Just try and make a competitor, theyll find a way to stop you. If we allow them....
One good use of LLMs would be a tool to make sense of code changes for people with no coding experience nor familiarity with projects with a massive code base like Thor, people could send code snippets and get a response if it is actually a threat for their privacy and or security.
Maybe some based dev could use one of the Open Source models to train into looking specifically privacy invasion or attempted deanonymization for the users.
The webcam is very nice! Hope you continue with this type of content.
TempleOS phone is what I use.
great minds think alike
Only lets you put God in your contacts
@@MentalOutlawDo we really need a phone to have God as a contact? I just want the glowies out of my phone.
I get about 20 scam calls from India every day. I’ve begun answering their pitch with one of my own asking if the dude will help me avoid US sanctions against Russia by using his country’s neutral relationship to make some “serious money.” They always hang up.
You think the NSA is listening? Maybe they’ll get tired of all these false positives and take out the scam callers.
This phone’s going to need your SSN to unlock and your latest search history to reset your password!
Its a honeypot phone
Onion
Care to share your thoughts on Veilid?
Will you ever have the "Come and Find it" shirt available in long sleeve? Seems like all the others have long sleeve just not that one.
erik "trust me bro i ran a mercenary group that murdered civilians" prince
a dating app for anti-vaxx schizos is hilarious lmao
Can you make another video about what options are actually good? You mentioned graphite and others?
Thanks for the video but I have to say that that's a great classic Habsburg beard. Go for it!
This guy glows so bright i have to look away
If the bootloader is not locked down then this might be a better option than Pixel devices to install GrapheneOS on
Fair point.
What about firmware backdoors? I mean google and apple probably has them too, but somehow I trust this guy less
I dunno. I actually like my Pixel with a custom ROM, but that's just me. I wouldn't trade it for one of those. And I hate Google
@@darthrevan501stthere is no such evidence