use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~1 user here now
A sub dedicated to one of the most beautiful places on earth, be it digital or analogue: a private one.
"Remove It Before You Use The Phone!" Edward Snowden 2022
submitted 2 years ago by asterias from youtube.com
[–]Brewdabier 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 1 fun4 insightful - 2 fun - 2 years ago (0 children)
This information is over 30 years old, well for me anyway.
[–]LarrySwinger2 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 1 fun3 insightful - 2 fun - 2 years ago (2 children)
Do all of these exploits rely on rooting the phone? I use a(n unrootable) BlackBerry (a modern one with Android). I want to know if that means I don't have to worry about this.
[–]asterias[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - 2 years ago (1 child)
BlackBerry are supposed to be more secure, but weren't they obliged to give access to certain governments? I guess someone experienced with BlackBerry will have to give a definitive answer.
[–]LarrySwinger2 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - 2 years ago (0 children)
Yes, they were, but that was about BBM i.e. they can access communications stored on their servers, just like with Prism. There are also exploits for all the older BlackBerries that use BlackBerry OS. I believe they can steal your data remotely if you're a target. That's something different, though, and didn't require any keys from BlackBerry. But they created a special, hardened BlackBerry for Obama when he was president, because of these exploits. BlackBerry was never as secure as we'd like to think. But all of this has nothing to do with the Android BlackBerries, so it doesn't answer my question.
[–]jostiniane 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 0 fun3 insightful - 1 fun - 2 years ago (2 children)
for people who don't want to spend 10 minutes on this clickbaity video.
He says he opens the phone and removes the microphone and the camera, use an external phone/camera whenever he needs them.. Keeps repeating that once the phone/computer is hacked they can do what you can do (so normies can understand)
He also explains about data collection and its consequences... the microphone part is only a part of the whole video.
[–]jostiniane 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - 2 years ago (0 children)
yeah, but it is the answer to the clickbaity title you put.
[–]Brewdabier 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 1 fun4 insightful - 2 fun - (0 children)
[–]LarrySwinger2 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 1 fun3 insightful - 2 fun - (2 children)
[–]asterias[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - (1 child)
[–]LarrySwinger2 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - (0 children)
[–]jostiniane 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 0 fun3 insightful - 1 fun - (2 children)
[–]asterias[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - (1 child)
[–]jostiniane 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 0 fun2 insightful - 1 fun - (0 children)