In case you use OpenPGP on a smartphone ...
ryan at digicana.com
Wed Aug 12 17:15:33 CEST 2020
If you don't want to be location tracked on a mobile device you just
power it off and put it in a Faraday bag when not in use.
If you want to deep dive into this sort of thing (it's a really deep
lake), give this book a read:
On 8/11/20 3:32 AM, Stefan Claas wrote:
> Matthias Apitz wrote:
>> El día Montag, August 10, 2020 a las 09:07:51 +0200, Stefan Claas escribió:
>>>> One can use a Linux mobile phone running UBports.com (as I and all my family do)
>>>> or the upcoming Puri.sm L5 (as I pre-ordered in October 2017).
>>> Yes, people gave me already (not from here of course) good advise for other OSs
>>> which one can use. The question is how long will those OSs been unaffected ...
>> The kernel and all apps are OpenSource i.e. people can (and do) read the
>> sources. It's impossible to build in backdoors. The attack could come
>> through the firmware in the chips (which are not OpenSource). For this
>> the Puri.sm L5 (and the laptops they make also) have 3 hardware keys to
>> poweroff WiFi, Cellular, Microphone/Cameras (all 3 will turn off GPS).
>> The authorities can not track you. See:
> Thanks for the information! While it is a nice product, according to their web site,
> they say they run Gnu/Linux. Do you think that Gnu/Linux can't be hacked? Or better
> said, should we all (those who use encryption software often) still use it directly
> on online devices?
> my 'hidden' service gopherhole:
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
PGP Fingerprint: 5C73 8727 EE58 786A 777C 4F1D B5AA 3FA3 486E D7AD
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 839 bytes
Desc: OpenPGP digital signature
More information about the Gnupg-users