View Full Version : Do you read/post from your Androids?
Awoke
6th July 2012, 08:48 AM
Just wondering what the concensus is on GSus'rs that own smart phones. Do you read or post on GSus with your smart phones? I was considering setting up an account with Gmail so I could link my phone to the web and surf here and there, but it seems so NWOish to me that I got spooked during the "Create and account" process.
LuckyStrike
6th July 2012, 09:12 AM
I'm on my laptop, tethered to my Galaxy Note right now, does that count?
Awoke
6th July 2012, 09:20 AM
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
chad
6th July 2012, 09:33 AM
i use my iphone all the time. they already know who & where you are anyway.
horseshoe3
6th July 2012, 09:41 AM
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
Isn't that what you are doing with any type of connection? I'm definitely not a techie, but I always thought that TPTB could trace us all pretty easily through our IP adresses. Unless you are savvy enough to run through a proxy or whatever - then it would only make it slightly more difficult for them.
madfranks
6th July 2012, 09:45 AM
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
You could always visit GSUS on your phone through a third party browser like Skyfire, then through one of those anonymization websites like anonymouse.org.
iOWNme
6th July 2012, 09:48 AM
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
They already know who you are and what side you are on. Arent you PROUD of who you are and what side your on?
Are you a criminal? Have you done anything wrong? So why are you afraid?
I stepped out of this mindset just a short while ago. I have nothing to hide. I am not a criminal. I am standing for Truth, Morals and Reality. I will not be silenced, i will not change my life, i will not bend my actions like a game of Twister, to accomodate the NWO.
BREAK YOUR CONDITIONING!
*Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion....
LuckyStrike
6th July 2012, 09:57 AM
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
At home, do you pay your ISP bill with your actual identity or use an alias? If you do than they can find you that way just as easily.
I totally understand where you're coming from, but IMO if they want to know who awoke is with an unlimited budget like they have, I think they can find out regardless of what technology you use.
Blink
6th July 2012, 10:00 AM
Don't own a smart phone or any other "smart" device. I work with technology, but, don't need to sign up to the volunteer information network in my personal life. Some get confused and upset when they realize that I'm not easily accessible. I don't give a sh*t. Leave me a message cuz there isn't anything that important that I need to have an electric dogtag on for............
chad
6th July 2012, 10:02 AM
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now.
Blink
6th July 2012, 10:04 AM
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now.
Thats right. So, if you don't own one, they don't be tracking you (at least for now).......
sirgonzo420
6th July 2012, 10:10 AM
Awoke, it would benefit you to learn about PGP/GPG encryption...
You can encrypt files with your private key, so that only you can decrypt it.
You can exchange public keys and send encrypted messages to others.
So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.
Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
big country
6th July 2012, 10:24 AM
I post from an android tablet (HP Touchpad w/ Cyanogen Mod installed) sometimes. I'm not worried about it. I don't post much that is inflamitory anyways. Just a regular Joe with a thrist for knowledge and sharing.
Awoke
6th July 2012, 11:13 AM
All great posts. Thanks everyone. I have no doubts that TPTB know who I am and where I am, but the stubborn side of me just resists the thought of handing it to them on a silver platter.
*Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion....
You need a Gmail account to set your Android phone account up to add apps and shit. I guess I don't need it to browse the forum, but just signing in over the phone is a dead giveaway anyways, I think.
Awoke, it would benefit you to learn about PGP/GPG encryption...
I know I should look into it. There are a few people here that use it, but I just figured it was a jew tool for datamining.
vacuum
6th July 2012, 11:24 AM
Sure 'they' know who you are already, but it might take a dedicated human to sit down and do research on you to create a profile which must then be analyzed.
If you use certain things however, they can then use automated tools to parse your information and create the profile without any work at all. Things like Facebook, Gmail, and Android phones would probably allow them to do this.
I don't think privacy is an all-or-nothing thing.
Gaillo
6th July 2012, 01:22 PM
I don't have an Android device/phone... but I do most of my reading and posting here using my iPad (1st Gen.) or my iPhone 3. The only real problems I've run into is that it's difficult to view video clips (not impossible...) and I can't upload images, so I end up hotlinking them when needed. I don't care about anonymity from TPTB, as an earlier poster correctly pointed out they know who we are if they want that info. I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to.
Overall, though, it's a satisfactory forum browsing experience with my devices.
MAGNES
6th July 2012, 01:25 PM
I have two apple products, iphone and ipad, I bought the iPad cause of Gaillo recommendation,
for reading PDF's , works great, also great, saves me time getting mail and quick
news, I keep it out of my bedroom though, once I am in there I do not want to
know anything about what you peeps are doing on here.;D
I wouldn't worry about the gov, you should stay anonymous on the forums though.
Use anonymous email, not tied to anything, this is how skyvike was outed as high level mason, email.
added after Gaillo thanked post,
DEC 2007
http://i46.tinypic.com/izvujt.jpg
Save this, make baldy sweat, this is a response to
the attacks on me by your agents, more is coming skyvike.
horseshoe3
6th July 2012, 01:45 PM
I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to.
I've had the same thoughts about the encryption programs like Gonzo mentioned above. They give you a key. What's to say they don't keep a copy of the key for themselves or for the "authorities"? Also, when you get the file and open it with your key, I'll bet they can take a screen shot of it without you knowing it, thereby circumventing the need for them to even have a key. In short, there is no way to have private communication on the internet, so watch what you say.
big country
6th July 2012, 05:15 PM
I've had the same thoughts about the encryption programs like Gonzo mentioned above. They give you a key. What's to say they don't keep a copy of the key for themselves or for the "authorities"? Also, when you get the file and open it with your key, I'll bet they can take a screen shot of it without you knowing it, thereby circumventing the need for them to even have a key. In short, there is no way to have private communication on the internet, so watch what you say.
Not to be a jackass, but that's not how it works...
PGP encryption isn't a program, its an encryption algorithm. Many programs can use PGP, are some a trap?Its possible but very unfair to say they all do. Hell most modern Linux OSes come with their own encryption "programs" as part of the OS. Surely the open source community would out any nefarious encryption that came with the build.
LuckyStrike
6th July 2012, 08:18 PM
Awoke, it would benefit you to learn about PGP/GPG encryption...
You can encrypt files with your private key, so that only you can decrypt it.
You can exchange public keys and send encrypted messages to others.
So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.
Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
To your last point, I've always been leery of Tor, being that it was developed by the US Govt. I have always been of the opinion that since there is no feasible way to meaningfully sift through all of the data online, that they use programs like that to catch people who try to hide things. Kinda like how they go after people who turn on side streets coming up to DUI checkpoints.
I understand how Tor works, and how the 3rd server doesn't know anything about the 1st server and so on, but it is my opinion that the Gov runs at least one of the servers and scans the info, if it is deemed important to them they then do follow the trail through.
I think the strongest reason for encryption is plausible deniablity. It is also my understanding that under the DMCA that it is illegal for someone (anyone) to hijack and decrypt a transmission that they were not the recipient of. A case which would certainly hold up in a just court, the problem being those are few and far between.
Golden
6th July 2012, 08:53 PM
No. No cell. I am one of the most "free" I've known given circumstance and perhaps this connection among the few. It would be interesting to know the numbers but that would require a certain sacrifice of the individual I would not accept knowingly. Meh, I'm feeding the beast as I type...
TheNocturnalEgyptian
7th July 2012, 02:27 AM
I do not have a cell phone. I am paranoid that GPS locations and remote activated microphones are real possibilities. I know, I know...it's a stretch, despite being technologically possible.
Besides, project ECHELON has been in use since the 1970's...so what am I so worried about?
But cell phones make me feel sick for some reason...as much as I love the internet, I just can't use a cell.
Awoke
9th July 2012, 06:51 AM
I do not have a cell phone. I am paranoid that GPS locations and remote activated microphones are real possibilities. I know, I know...it's a stretch, despite being technologically possible.
It's not a stretch. It's a reality that the .gov has already admitted to.
DMac
9th July 2012, 06:59 AM
It's not a stretch. It's a reality that the .gov has already admitted to.
The technology is becoming so amateur that a good private investigator could remotely activate your cell camera/microphone.
Twisted Titan
9th July 2012, 08:29 AM
http://gold-silver.us/forum/showthread.php?62076-What-I-learned-today&p=556104#post556104
steyr_m
9th July 2012, 01:42 PM
Awoke, it would benefit you to learn about PGP/GPG encryption...
You can encrypt files with your private key, so that only you can decrypt it.
You can exchange public keys and send encrypted messages to others.
So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.
Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
I know you and I have the same thoughts on encryption, but on the heels of your post.....
Wasn't GSUS supposed to switch to https?
Dogman
9th July 2012, 01:44 PM
I know you and I have the same thoughts on encryption, but on the heels of your post.....
Wasn't GSUS supposed to switch to https? Think there was more talk than anything, it would be nice if it was done.
slowbell
9th July 2012, 01:48 PM
It's not a stretch. It's a reality that the .gov has already admitted to.
The FBI admitted to using this technology to fight organized crime in New York. They have the ability to remotely turn on the microphone on cell phones and listen in on conversations. Any conversation that the microphone can pick up, such as two guys sitting there talking in a car. Get this, the phone does not even have to be turned on. It can be shut down, off, and they can still do this. The only way to avoid it, is to take the battery out of the cell phone.
This is not just andriod phones, but all cell phones.
They can track us with the GPS if they want to, and listen to us, if they want to.
steyr_m
9th July 2012, 04:20 PM
Think there was more talk than anything, it would be nice if it was done.
Agreed, how hard could it be? I'd offer help too...
steyr_m
9th July 2012, 04:24 PM
I do not have a cell phone.
Me either because:
1. They are expensive
2. I don't need one.
3. I don't want my own personal tracking device
monty
28th December 2016, 09:08 AM
https://motherboard.vice.com/read/heres-north-koreas-totalitarian-android-tablet
North Korean android tablet Woolim is government compliant
Here’s North Korea’s Totalitarian Android Tablet
December 27, 2016 // 05:32 PM EST
https://motherboard-images.vice.com/content-images/contentimage/no-id/1482878136868820.JPG
Image: Joseph Cox/Motherboard
When you think of North Korea, the first thing that springs to mind is probably not a well-featured tablet PC. But that's just what researchers at the Chaos Communication Congress hacking festival revealed on Tuesday.
Called Woolim, this tablet is designed to limit the distribution of contraband media, track its users, and generally act as a propaganda platform for the Democratic People's Republic of Korea (DPRK).
“It's pretty locked down,” researcher Florian Grunow told Motherboard in an interview on Tuesday. Grunow presented the research along with co-researchers Niklaus Schiess and Manuel Lubetzki.
Woolim is a small, white Android device that looks like a fairly standard tablet. The hardware itself is made by Chinese manufacturer Hoozo (https://hoozo.en.alibaba.com/), but the North Korean government has removed some components such as those for wi-fi and bluetooth, and put its own bespoke software on top.
After the researchers presented work covering RedStar OS (https://motherboard.vice.com/read/inside-north-koreas-totalitarian-operating-system), North Korea’s Linux-based operating system, a South Korean NGO offered the tablet to the group. Woolim is just one of several tablets designed for North Korea, but Woolim appears to be the most recent, likely dating from 2015.
The tablet has PDFs on how to use it; various propaganda texts for users to read as well as the capability to play local TV and connect to the country’s own internet, and it also comes with a slew of educational apps, such as French, Russian, and Chinese dictionaries. There's even an app for kids which teaches them how to type with a keyboard, and video games such as Angry Birds that have been lightly customized.
But don't try to push Woolim much further than that: it won't let you.
https://motherboard-images.vice.com/content-images/contentimage/40816/1482878536562392.JPG
Image: Joseph Cox/Motherboard
The tablet only allows specific files to be used or played: users cannot just load whatever they want onto the device.
“This goes for all of the files; it even goes for HTML files and for text files,” Grunow said. When a user tries to open a file, the tablet will check the file's cryptographic signature; unless it was a file generated by the tablet itself—such as a photograph the user took—or a file sanctioned by the government, it simply won't open. Grunow demonstrated this for Motherboard by trying to open a third-party .APK file on the device, with no success.
“For a normal user in DPRK I would say it's nearly impossible to get around the signature algorithm,” Grunow said.
Woolim also constantly keeps tabs on what its users are up to. Whenever a user opens an app, the tablet takes a screenshot. These screenshots are then available for viewing in another app, but they can’t be deleted.
“This is the clear message: we see what you're doing right here,” Grunow said.
It's not totally clear who in North Korea would have access to this sort of tablet, however. Grunow said that the hardware itself would cost around 160-200 Euros from the Chinese manufacturer, so presumably it might be a bit more expensive in North Korea itself.
“The target audience is definitely someone with money, so it's not the normal working class I would suppose,” he added.
Twisted Titan
28th December 2016, 09:41 AM
“The target audience is definitely someone with money, so it's not the normal working class I would suppose,” he added.
So you miss the very group that would have a interest in fomenting a uprising.
Brilliant Minds At Work Yet Again
Dogman
28th December 2016, 09:50 AM
Status toy, for the ones that are higher in the food chain. That's also a reminder that they are only a trigger pull away from loosing everything if they don't play the state's game with enthusiasm!
The book 1984 is the state's handbook!
Powered by vBulletin® Version 4.2.0 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.