mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-23 14:50:45 -04:00
tail best updates, pdf macro
This commit is contained in:
parent
11986c34cb
commit
0031e85f7a
15 changed files with 62 additions and 22 deletions
|
@ -10,6 +10,8 @@ tags = ["mobile"]
|
|||
blogimage="/images/prison.jpg"
|
||||
toc=true
|
||||
dateedit=2023-05-10
|
||||
a4="nophones-a4.pdf"
|
||||
letter="nophones-letter.pdf"
|
||||
+++
|
||||
|
||||
With effective [security culture and OPSEC](https://www.csrc.link/read/csrc-bulletin-1-en.html#header-a-base-to-stand-on-distinguishing-opsec-and-security-culture), the forces of repression wouldn't know about our specific criminal activities, but they also wouldn't know about our lives, [relationships](https://www.csrc.link/threat-library/techniques/network-mapping.html), movement patterns, etc. This knowledge is a huge asset to help them narrow down suspects and execute targeted surveillance. The location of your phone is [tracked at all times](https://www.vice.com/en/article/m7vqkv/how-fbi-gets-phone-data-att-tmobile-verizon), and this data is harvested by private companies, enabling police to bypass laws requiring them to obtain a warrant. [Hardware identifiers and the subscription information](https://anonymousplanet.org/guide.html#your-imei-and-imsi-and-by-extension-your-phone-number) of the phone are logged by cell towers with every connection. Hacking services like [Pegasus](https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/) bring total phone compromise within the reach of even local law enforcement agencies, and are 'zero-click', meaning that success doesn't rely on you clicking a link or opening a file.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue