They have no value unless you yourself follow the advice in them. The value is learning how to stop your personal data leaking out onto the Internet but you have to "plug the leak".
All of this reminds me of the days back in the 80's when , Cobra, VIPER and LowJACK car alarms and radar detectors were the thing....later we discovered that the same company that was making the detector was making the radar gun.
Straight talk is saying they are doing verizon now and said they would send me a sim card. Im actually surprised mine is still working! I havent done the update because Im am not interested in these phones and more interested in Brax phone! Thank you Rob! I always enjoy learning what you to teach and its a lot! I think Im ready to let go of that word that means a 1 and a hundred 0's after it!👍🙏🕊
7:32 that's fascinating, how an actual hacker can carry with himself a portable IMSI catcher concealed even in his clothes in a crowd, walking closer to his target, totally ignorant of the danger!
They tend to be a bit bigger since they require a lot of power, memory, and processing power. For example, the stingrays are rack mounted and generate a ton of heat. Typical use would be vehicle mounted, like a white work van. Consider that the power requirements are huge as you are essentially overpowering the signal of the nearest cell tower so you can connect to nearby phones. To my understanding, there are a few "pocket" devices out there however they need someone to be very close, since if the cell tower signal is stronger (perceived as closer) it will connect regardless of the device attempting to take control. Again, power is the limiting factor in this case. That being said, I could be entirely wrong as I may be a bit out of date with my information.
@@rhyleymasterit’s been years since I read ETSI specifications and I might not remember correctly but I don’t think IMSI is actually paired with SIM card. Even if it was - it’s just a number not saying anything about subscribers identity. SIM card is paired with MSISDN (that is the actual phone number). Identification of the account is done on the network computers for billing purposes only. The network and handsets work in sort of an anonymised mode. Network doesn’t need to know who the handset belongs to, same - who the SIM card belongs to in order to function properly. Identification and authentication is necessary for billing and accounting purposes (for post paid and prepaid respectively).
Watched a video recently with a lawyer who dealt with ATT and of course almost no info was able to be disclosed even in court. Most importantly, the SIM is not just a “handshake for the network”…it’s also an entire processor on a chip about 2sq centimeter in size that also saves data to be gathered by any number of state level folks, down to local police. I’m guessing anyone in any embassy has a base level phone that is physically destroyed/changed every week for sheer data analysis complication. But ya, don’t text and drive, because that trooper can send your sim to the state in the event of a crash. Or send state level cables. Both are just as important.
everything you say is proven in that movie "2,000 mules". Your comments on that movie would make a good video. Go For It. but then I've know how that tracking works once I figured out google traffic maps were based on where cell phones were clustered on the roads long ago.
It’s actually a special service providing visualisation of the tracking. Networks cannot function without constant tracking of all the handsets and detailed knowledge about which BTS is the best to route the call to.
Faraday bag from SLNT, leave SIM phone in the car or backpack when out and about. Physically carry another phone with no service, connect to public Wifi with VPN+killswitch if absolutely needed. I take this seriously, and people get ignored for hours. Oops.
Faraday bags are a complete waste of time. With an Apple or Google Android phone, you are tracked by either of them the moment you take the phone out of the bag to use it. Algorithms then analyse that tracking data and can probably work out how you got to that point from the last time you took the phone out of the bag to use it. Save your money and do your research. Buy an Android phone that you can de-Google and carry that about with you. Or buy one from Rob. In either scenario, wifi triangulation doesn't work as long as you don't install Google Apps. Yes, your cellular provider can track you inaccurately (on 4G) through cell towers but you can't avoid that and the information stays with them anyway unless legal authorities subpoena the information. It will be different under 5G where tracking by the cellphone provider will be a lot more accurate - so hold off on moving to 5G as long as possible.
Yes only if absolutely needed when out and about, otherwise it only gets checked a few times a day, never connects to wifi(the SIM phone) That's what my other phones are for, with no sim to disassociate it with an IMSI.
In Ireland there is still 2g available on mobile phone networks. At a rural location I visit occasionally, the only way I can make a halfway decent voice call is by manually selecting 2g. The phone always goes to the 4g network even though signal is too weak to carry a voice call. If the network, towers, infrastructure etc. exists, why remove it ? Is maintenance very costly?
Based in the UK myself. 2G is still available but being fazed out (unless it already has been fazed out). I believe they want to repurpose the 2G wave lengths for other things (remember reading something but can't recall what specifically) IOT or possibly tv?
Great info will be checking out your phone's I have come up with new problem with security cameras reqiring wifi and our cops in Paul's valley ok driving around accessing cameras remotely changing settings retreving audio, video, turning off as criminal activity are going on, deleting and other violations of civil rights without warrants going after low income people
You never want to use a WiFi camera, as they are all vulnerable to being disconnected using a deAuth attack. You want to run hardwired IP cameras, and really think about whether you need remote access or not.
The XMPP protocol appears to offer exceptional messaging tools, with audio and video support by most open source apps supporting the protocol. Combine with wifi and/or an anonymous data only service --why wouldn't this combo be just about the best solution available for private and secure communications???
The other nice thing about having your communication routed using XMPP, is that you're not forced to use a device that has a simcard slot. I'm able to get my voice calls, text/MMS on a laptop over Ethernet.
You mentioned "programmable SIM Card features"? My biggest concern, after watching this video, is the default 3G access. Is there any way to "program" a SIM Card for a current 5G phone, to refuse 3G connections? I have a switch in Network Settings that permits me to do this with 2G connections called "always allow 2G" on/off. Is there a way to do this at the 3G level? Paul M. Atlanta, GA
I've often thought that, with all the attacks on our personal privacy these days, combined with all the censorship & biased perspectives on current issues being put out there by MAGA - FT (that's Microsoft, Apple, Google, Amazon, Facebook & Twitter - not that other "MAGA") - some of the scenes from that 1976 movie "Network" (starring Peter Finch, Faye Dunaway & William Holden), could appear very relevant, even today. There is one very memorable scene in the movie, where Peter Finch, during a live US TV broadcast, encourages viewers to stick their heads out their windows (just as he has done) & shout "I'm mad as hell, & I'm not going to take this anymore!" The outlandish tactics of the Peter Finch character in previous live broadcasts had garnered a massive viewer following, so when he encouraged his viewers to stick their heads out their windows & shout that message - literally millions of people around the country did that. If only a similar reaction could be invoked in people, in relation to all the attacks on our privacy & the censorship of big tech!
I keep my phone in one as I travel about. Use an old garmin for maps and only bring it out if I absolutely need it. Looking forward to getting my degoogled any day now.
@@robbraxmantech thank you very much for the response cuz I was absolutely not sure if that was a good idea I guess it would help but still not be perfect?
What would be the purpose of such solution? The SIM card in a hotspot device still has an MSISDN associated to it and is linked to an account and you pay for it. Unless it’s prepaid with a scratch card - I don’t even know if they exist anymore…
I am curious if a network can send a signal to disable the phone, putting it through boot loop unless you go into recovery and do a restore. But it would go back to boot loop again once it connects to network. I Faraday caged my phone using anti static bags and it wouldn't loop anymore but once bag is opened, one min later, would go back to boot loop.
Sorry. SIM card does not identify mobile subscriber. It identifies an Account. The Account is assigned to a subscriber. If you want to be strict technically. KI stands for Key Identifier as far as I remeber. Removing SIM card will not help you in ways you think. Handset still broadcasts IMEI - even without a SIM card…
He has already done this on several occasions. You just need to be less lazy and more proactive by searching through his videos and paying attention to the content. You're welcome. You can thank me later.
They can ACTIVATE The esim anytime ON any Phone eveni iphone and use that to monitor ON IPv6 you can tell by removingThe sim and you Will see The cellular icon still transmitting. I dont know if airplane mode Will disengage The esim ON The iphone or Not as The icon blocks The cellular data symbol.
You're talking about the device using cell data when no SIM card is inserted? Are you sure that this has anything to do with eSIM? It sounds like it could just be basic cell connection that can occur without any type of SIM at all (such as used for 911 calls).
I had 2 phones twinned by major companies. They were turning on the camera and filming me and putting it up on some website. I couldn't get any new phones or compensation from either company and I paid for the phones new. These companies are completely out of control and abusing innocent women.
I wonder why there are no decentralized sim cards a bit like Tor or VPN works. You have a local number but when people call you it has to go through other layers of ghost numbers which change every time you receive calls. That would make tracking your location, wiretap, etc practically impossible? If that exists please let me know the company that does that
It’s simple. Networks belong to telco companies and they don’t want such functionality. Also - that would introduce additional traffic on the networks - and traffic equals $$$ (bandwidth). Also - the network’s immanent feature is being able to identify location of each handset at all times in order to set up calls. If the network loses track of your handset - you can’t receive calls!
Hey Rob! As a public figure looking to be seen and who is searching for the opposite of privacy protection because my information has already been plastered all over the internet. What would you say the best way to get people to see your online content would be? I mean every platform I post my content always seems to hide my stuff and having been on social media for over 15 years I am tired of it. Any tips?
SEO is general. Better meta data, key words, titles and descriptions. Modify the file meta data prior to uploading to include key phrases and words used on search engines... just a compete novices take. Hope it helps some at least bud
@COBRA Thanks for sharing what you did and "Hello" from Maine. I even get more views than 8-10 just by showing the local scenery in short videos. I have yet to 'put myself out there' using face and vocals though. It's something new and I'm 65...old. I don't want to sound like a bumbling or 'boomer"ing idiot and then have to edit the whole thing just to state some decent-sounding things. I miss out on a lot though because I'm so 'extravert' it's pathetic. I grew up with a back yard swimming pool, in L.A., and I wouldn't mind having a decent-sized, friendly set of internet "friends" that took time to "like" me. My 69 count subscriber channel does get dusty at times and the frigid climate wasn't that helpful videoing the Back Cove this morning at 6:30 AM, I'll tell ya.
Modern cell phones have many cpu. Can the phone use 4-5 cores to maintain security integrity and privacy? How much artificial intelligence is needed to identify attackers as fiend or foe? What encryption does military use for radio signals that consumers can't have? *How can wi-fi be mil-spec secure?*
Great video as usual .... but opps..on the volta having any data only plan. And the talk and text (no data,) is the only plan at 19,99, And The unlimited Talk and Text and data is somewhat cheap at now special, $39.99 per month. Still a great deal for security, no KYC... if we can bring our own phones! Thank you for your INFO!
@@robbraxmantechThank you for the 12 vids I've had time to watch, so far! I wouldn't use it either, ..... as I rather use Element, or Briar... anyway, I only like "opensource" apps, and if others don't... I don't need to converse with them anyway! LOL! Again thank you for your vids!
My phones can't be tricked to make calls or send messages. The 4G/LTE can be intercepted directly, no need to disable encryption. Reason for which I am developing hardware voice encryption for the security phones I make.
So if I get a Braxx phone, a new SIM card with new number, if I talk, text or message my son, on his IPhone, wouldn’t my new information be data mined thru his contact info?
I have the same question... wouldn’t ‘they’ be able to figure out that my iPhone is no longer in use, the kids and hubby are all texting and calling this new number and we are all on the same carrier plan... 🤔 yup! Must be Mama. I want to be as Ghost as possible, yet still have the ability to connect. Am I just dreaming that it’s possible? From what I’m getting here is they will probably know that it’s you but not be able to mine any info of you. But couldn’t they just retrieve the other parties texts etc?
@@cinsforgiven7you could do it only if all three of you buy prepaid cards and use scratch cards to recharge your accounts. But then - you still call to your friends, and they put your new numbers into their contacts app and Facebook reads it. There you go! The anonymity is a myth and can’t be achieved in reality with majority of population being completely oblivious to what’s going on…
@@cinsforgiven7 it's possible in theory, but if your previous device stop communication and another device appears in its place it doesn't mean that they should (nor would) assume that it was the same person. For example it could be someone cutting a relationship and starting a new one at the same time (maybe most likely with romantic relationships but certainly not exclusive to that). The scary part is how Apple or Google (or even another OEM like Samsung/HTC/ASUS) could read contact list information such as e-mail address, first name, last name, nickname, address, etc.. Combined with the scary AI that exists now (or at least scarier in the near future) and other contextual and/or historical information it could make some very intelligent guesses. An AI system would probably recognize "mom" as his mom, and instantly connect all that old data to you unless there's any indication that he's ever had 2 moms. But short of using AI to do this (which I think they might not actually be doing yet) I think it's unlikely that they could do much connections aside from specifically verbatim first name + last name connections. I'm sure they use AI for things related to this (such as tying names to numbers and numbers to accounts, deciphering/sorting duplicate names that have different numbers, and cross-referencing stuff and making relationship webs, but _not_ deciphering what "mom" means when no name is provided), but I have doubts that they would be using it for specific user guessing and relationship guessing (like deciphering "mom", "PJ", or even just "kate")
Just checked Volta's prices, their cheapest $19.99 plan has unlimited LOW speed data in Canada 😃 & USA, but unlimited HIGH speed data is $39.99 in the USA... *_in Canada it's $199.99 / MONTH!!!!!!!!!!!!!_* Canada is worse than the 3rd world for cell plans, especially data.
Is the audio normalized enough? It seems louder at the start of some sentences, and a lot quieter other times. It could be my ears or old speaker though, but normalized audio is Great. Good info. Kinda depressing, but good. PS. getting an affiliate link for Volta might help out with the bills?
Excellent video. I saw you mentioned Volta wireless in one on your videos, do you recommend their sim card with your phone Brax2? I saw they also have phone now. Do you have review on that?
@@robbraxmantech Okay, thank you for letting me know. Any recommendation on what to use with your phone? I like the idea of a data only sim card as I find wifi actually gets hacked into quite a bit. Any thoughts on this and recommendations regarding phone company to go with? Are there any good phone company's that are not big tech? I guess not? Appreciate your help.
The mobile phone without a SIM card still communicates with mobile network. You said a 911 call only becomes visible when you initiate a 911 call, but I’m not sure this is true. Are we sure a unit can’t be seen and tracked even if you remove the SIM card? My phone without a SIM shows that it’s still searching for cell towers. It’s unclear to me what is going on.
Of course each handset connects to any available BTS without a SIM card installed. It is handled as a roaming device and not only can be but is tracked. Networks immanent feature is tracking handsets. No calls can be routed when handsets are not tracked 100% time.
@@robbraxmantech Thanx Rob. I have one question more wich Linux OS shold I use for every day just Internet, e-mail. And wich is social network is private or is used by people wich like private and anonymus chat. Tnx for rpl.
@@robbraxmantech Yeah sure. I will buy it. I'm putting money on side. :D This will be my fifth smart phone. I always had a Nokia burner phones. Now I have Samsung and I can't install AOSP.
my next door neighbor gave me a new cell phone that he could NOT be heard on when trying to call someone and the service provider VERIZON could NOT fix it so he had to get another phone. since the phone does NOT have his sim card, the damn thing has the WRONG DATE AND TIME !!! have taken the battery out but have NOT took the time to strip it down yet to recover the metals! it is an ORBIC RC 2200L
Think about it. The 911 emergency is jot a one way initiated connection. 911 dan call a no sim phone back. Now think how it couid do that if you have no issued number or idea. They use the cellular hardware MEID code. It functions exactly how a phone number or sim would function. It also can enable a passive call connection to the phone. It is how a sig int team can target and use a phone as a eavesdrop device even if the sim is removed deleted whatever. Same goes with the powered off unless you have a removable battery or a direct physical on off switch that physically cuts power from the battery. It has to ge an addonnmod on 99.9% phones
There's a lot of extremely interesting & useful privacy information in the above video. I've often thought that if I use a new non-Google (Google-free) mobile phone without ever putting a SIM card in it, & just use it on free publicly accessible wifi internet connections with a VPN, together with security-conscious communication apps that do not require a real identity, then it would be very difficult for me to be identified by using that mobile phone. The phone, of course, would still have its IMEI & serial number, but these are generally not recorded at the point of sale - especially if you purchase the phone at something like a supermarket or variety store, & not a store belonging to one of the mobile phone carriers. To make the purchase transaction even more identity-free, you could easily purchase the phone using cash &/or have a 3rd party/friend purchase the phone on your behalf, in case there are security cameras in the store. Or if you purchase the phone on-line, you could also use a mail forwarding service - though the seller may still have/want your name & other contact details. Of course, only being able to use the phone in conjunction with free public wifi internet access (which usually won't require any personal details - although some may) may prove restrictive at times, especially if you're in an area that does not have any free public wifi internet access available. I regularly use free public wifi internet access when I'm out & about in the city (CBD), or on public transport etc. & in some restaurants/cafes etc - & it usually works very well. But occasionally I'm in areas with no such coverage - in which case it would be helpful to have a mobile/cell data internet connection available, if it's necessary to use a mobile phone in those situations.
But it's not a phone with a SIM card in it, is it? It's "just a computer" in which case stop thinking too much about it and just put Linux on a small laptop and carry that with you. With respect, you're demonstrating a lack of understanding of the topic anyway because on one hand you're trying to stop yourself being tracked but then you use public Internet access. You say it "usually" doesn't require login but that just says to me that if you have to log into a service to use it because of no choice, then you will do it as a last resort - and that's a complete "no-no" when it comes to privacy. I refuse to go near public wi-fi, I simply do not trust it because there could be someone sat only a couple of feet away from me innocently drinking coffee with a portable wifi access point upon their person and waiting for people to connect on. If anything, logging in with an identity might actually help to prove that I am connecting to a real access point, but then I am providing an identity that I don't want to provide. To me, the safest solution is to carry about a de-Googled phone that you just have for phone calls, SMS, media consumption and a few Open Source applications from F-Droid to, say, sync your contacts list with your home server running NextCloud. Do everything else on a Linux laptop, use browser segregation and fake identities as Rob recommends, and when you need Internet access on the go, switch you phone on as an access point and use the data allowance in your mobile contract. This is really simple privacy stuff here, again with respect.
@@terrydaktyllus1320 Thanks for your comments. Actually, I already practise many of the privacy recommendations previously suggested by this video channel - including browser isolation on both my mobile phone & home laptop PC. The concern I have with making phone calls, SMS & internet use from a mobile phone using a SIM card that also has mobile/cellular data, is that when you use that SIM card/phone number for those purposes, it then links to your phone's IMEI number in your mobile phone carrier's records, & it then usually displays as your IMEI number in your on-line account details with your phone carrier (at least, in my case, it does) Of course, once an IMEI number can be linked to a SIM card/phone number which, in my country at least, will also have a real identity associated with it, someone could then continue to use that IMEI for tracking purposes, even after the SIM card has been removed from the phone - because they now know who that IMEI number belongs to. As far as internet access using free public wifi is concerned - I don't just connect to any (unknown) wifi internet connection when out & about - I only connect to known sources of free wifi internet such as that provided & advertised by shopping complexes, restaurants, & public transport - which advertise that they offer free wifi internet for their customers etc. And I can't say that I've ever had a problem with them. Most of the free public wifi internet connections I've used do not require people to log in using a mobile phone number or email address as an identifier. If they've requested such information at the outset, then I do not use them. I was not suggesting using free public wifi internet access as a last resort only, but something which might be used to ensure privacy, because perhaps then, there would be no way your actual "identity" (which is at the crux of the privacy issue) could be revealed using that "combination" of methods I mentioned in my original post. While in theory, they may be able to still track your device, if they do know its IMEI, if they do not know the identity of the person to whom that IMEI belongs, there probably would not be much point to such tracking. Also, even though being used in the way I've suggested, may make the mobile phone seem more like "just a computer" than a mobile phone, I think someone carrying a mobile phone is likely to be seen as less "unusual" than say, someone carrying even a small laptop computer with them.
@@janburn007 I would say you understood everything. And your strategy is great, especially avoiding any link to your person by buying with cash. I would just suggest that you use an OS which allows a complete disconnection from the mobile network. This is important even when you are not inserting a sim card. Like a Wifi-only device. Some OSes even offer randomization of the MAC-address on the Wifi-interface, which is even better. You also understood the concept of end-to-end encryption, in contrast to Terry, and you can safely use any public, open network if you have a secure, hardened device. Keep the good thoughts and thank you for your great insight.
@@ralfsteiner7751 Thanks for your comments & extra suggestions for privacy. I did think that some of the suggestions made by Terry could possibly put me "in danger" if I were in a "Jason Bourne" type situation. In fact, if Jason Bourne had actually followed some of Terry's suggestions - he would have very easily been caught! So it's probably just as well that I would not have followed those suggestions of Terry's, in any case - as I could see their flaws. Some of those suggestions made by Terry sound like a "downright dodgy daktyllus" - LOL!
I like the data only idea you could get a Mobil hot spot and use data only service. Maybe magic jack could work on these type of networks. I never got one sales call on my magic jack phone number. 73
I purchased a brax2 for my son. We went to Tmobile store and got a sim card and a phone number for it, added it to my normal phone plan but it does not want to connect to the Tmobile network. We spent an hour or so on the phone with Tmobile tech support, they say everything on their end shows the sim is operating properly and should be able to connect to the network but it will not connect. We re-watched your RUclips videos on trouble shooting and updated everything, reviewed all the permission and still can't get it to connect. Can you offer any suggestions we can do to fix this issue?
@@robbraxmantech what video should we watch to make sure the APN is correct? I just got my Brax2 phone, and plan to switch to T-Mobile in 2 weeks myself. After watching your whole video, I’m thinking of switching to VOLTA instead of TMobile. Which route would you go today? TMobile or Volta for calls? Thanks in advance for your guidance on this!
So your Brax2 phone does not support prepaid? Or does not support prepaid only when a second phone is added to a plan? I am have TMobile prepaid plan and am gathering info to purchase a Brax.
@@robbraxmantech I've just watched this videoand downloaded the Volta app. I have an app on my phone called TC (Tracker Control) which tells me if an apk has any trackers in it. It picked up that the Volta app has 5 Google tracker libraries in it. That's a bit concerning...and I cannot find a contact on the Volta dite to ask them about it. I have a screenshot of it but no way to attach it here.
NOTHING is totally safe! My pet choice is an obsolete package of phone and sim from a Dollar store. Took an hour to activate but mainly to not so smart staff. Non of my ID's were asked but just the lacation was sort of suggested to be updated for the cheapest calls. So you pay more for extra privacy?
If someone got a data only + VoIP SIM, and wanted to use the same phone already being used on an existing SIM, will the existing SIM stop working? That is, will the phone number work on both SIMs?
Nope - phone number (MSISDN) is associated with SIM - one to one. The VoIP or data sim card also has its own MSISDN number - and it’s different from the MSISDN for your other SIM card. Both SIMcards will work but in a different way (the data card will not have ‘voice telephony’ service associated). Rob - what are you talking about?!?!
Yeah I think rob misunderstood the question. The number on the old SIM will not work when that SIM is not in the device. You could in theory _port_ that number to the new SIM, but obviously you're not talking about that sort of situation (because it's a data-only SIM). For both SIMs/plans to work simultaneously you would need a device with more than one SIM slot. That or regularly swap SIMs (if that is even a viable option for you) Although there's two other options as well: 1. porting your cell number to the VOIP service that you are using. Some services do allow this, but it will almost certainly require a lot of verification, so hard to remain anonymous to the VOIP provider if that is important to you. 2. If your device supports eSIM then you could get an eSIM plan along with a regular SIM card plan. Braxman has voiced some distrust of eSIM which is understandable, but from what I can tell there are no direct/proven privacy harms in using it as long as everything else is done in a privacy-conscious manner (such as paying for the eSIM via Monero or a prepaid credit card, assuming that you even care about having that high of a degree of privacy in the first place (privacy from government investigation, which I think many people don't care about compared to Google/Apple/Meta/Microsoft, etc.))
I work for a popular wireless carrier. How come people keep coming in with no service and I have to replace their sim card? 9 times out of 10 replacing the sim restores service. Just curious why they keep failing.
How can you call this phone privacy orientated if the camera is embedded on the screen? Should have gone pop up camera for the front and a back slide plate camera for the back.
I'm worried about government telling me that I "pinged a tower" in an area that the government claims I'm not supposed to have been, and then the government using this accusation to criminalize me, even though the Google or Apple logs would show the accusation itself to be false. It seems like we all need to be surrounded by witnesses so that the government can't claim that we did something that we did not do.
Are you professional in hardware handling? I need to know how to build a phone from breakdown or kit type. I dont trust most people who cant explain why other options not being wtong or right but just in theory...
You can buy an LTE modem chip from a semiconductor manufacturer, and build your own phone. There's a couple of open source cellphone projects, where you can build it from scratch, or assemble it as a kit.
Baseband modems are secretive and proprietary. You won't know detailed contents of the chip nor the code that runs on it. You can make an open source handheld computer, but the cell data part is not viable to do as far as I know. (I might be slightly out of date on this info though; I think people have been working on it, and it's possible that there might be limited functionality open cell modems now, but probably only old protocols that will have poor performance or no service at all anymore due to End-of-Life)
That's always a possibility. It's much the same way they shut off the older network support forcing you to upgrade to a phone that's likely tracking and listening to you at all times.
@@ipodman1910 You're wrong about that. With modern smartphones, they become full-on surveillance platforms when you install many of the popular social media apps. The FB app for example, is listening ALL THE TIME.
Rob is selling bit of a snake oil here. You can’t chaythe way networks were designed - their immanent feature is tracking handsets and there is nothing that can be done to prevent it if you want your phone to be functional.
@@ipodman1910 What _can_ be done is hide identity though. When they don't know anything about the owner then they aren't tracking the owner, they're just tracking some random device that they don't know "anything" about (aside from basic device ID stuff)
Pretty much yes, although there is a possibility that phones turn on their radio from time to time to send a ‘ping’ for tracking. Of course without users knowing about it.
@@ipodman1910how to shut down this radio tracker. I received a bill to pay for this service. My service provider tells me that it is a tax, which I do not believe. What can be done about this ?
Videos with these topics are extremely VALUABLE! It’s hard to find those topics out on the internet! Thank you Rob!!!!
They have no value unless you yourself follow the advice in them. The value is learning how to stop your personal data leaking out onto the Internet but you have to "plug the leak".
❤️🤫
Its in all your phone contracts if you read the fine print.
@@saltybits9954not really - but it’s ‚enough’ to read ETSI GSM specification. It’s all in there but good luck with that! It’s huge!
3:13 IMSI and TIMSI
4:17 K security key
5:16 3G downgrade
6:08 IMSI catcher (Stingray)
9:10 S@T Browser (Simjacker attack)
12:05 Exynos Hacks
14:09 Geofancing
15:14 SS7 channel and Data channel
17:50 Voip
19:07 Using Wi-Fi instead of sim card
19:28 KYC
Please help us some one !!!
A guy I was with,is harrsaing me
Sending me ditty filthy video s
How can I get help
Hi, Rob. Thanks for helping me prove I'm the smartest (by listening to someone much smarter than myself ). You Rock, buddy.
All of this reminds me of the days back in the 80's when , Cobra, VIPER and LowJACK car alarms and radar detectors were the thing....later we discovered that the same company that was making the detector was making the radar gun.
I hate that I need to learn these boring things. But I do. Thanks Rob for providing insights n solutions
Amen.
Thank you once again for all this good information 👍🏼🙂
Excellent video, as usual! Thanks a lot
Rob, always something new in your learning experience videos. This one was especially interesting to me
Still working on the “Knowledge “ of understanding. Knowing what you saying is true.
Straight talk is saying they are doing verizon now and said they would send me a sim card. Im actually surprised mine is still working! I havent done the update because Im am not interested in these phones and more interested in Brax phone! Thank you Rob! I always enjoy learning what you to teach and its a lot! I think Im ready to let go of that word that means a 1 and a hundred 0's after it!👍🙏🕊
Thanks for your brilliant vids. I always learn something valuable.
Rob, I love your videos! I would really like to see you do a video about how to unlock a phone!!✌️🙏❤️
7:32 that's fascinating, how an actual hacker can carry with himself a portable IMSI catcher concealed even in his clothes in a crowd, walking closer to his target, totally ignorant of the danger!
How you protect yourself from that?
They tend to be a bit bigger since they require a lot of power, memory, and processing power. For example, the stingrays are rack mounted and generate a ton of heat. Typical use would be vehicle mounted, like a white work van. Consider that the power requirements are huge as you are essentially overpowering the signal of the nearest cell tower so you can connect to nearby phones.
To my understanding, there are a few "pocket" devices out there however they need someone to be very close, since if the cell tower signal is stronger (perceived as closer) it will connect regardless of the device attempting to take control. Again, power is the limiting factor in this case.
That being said, I could be entirely wrong as I may be a bit out of date with my information.
@@rhyleymasterit’s been years since I read ETSI specifications and I might not remember correctly but I don’t think IMSI is actually paired with SIM card. Even if it was - it’s just a number not saying anything about subscribers identity. SIM card is paired with MSISDN (that is the actual phone number). Identification of the account is done on the network computers for billing purposes only. The network and handsets work in sort of an anonymised mode. Network doesn’t need to know who the handset belongs to, same - who the SIM card belongs to in order to function properly. Identification and authentication is necessary for billing and accounting purposes (for post paid and prepaid respectively).
new favorite educator! this is what a saint looks like in the future. thank you rob
Watched a video recently with a lawyer who dealt with ATT and of course almost no info was able to be disclosed even in court.
Most importantly, the SIM is not just a “handshake for the network”…it’s also an entire processor on a chip about 2sq centimeter in size that also saves data to be gathered by any number of state level folks, down to local police.
I’m guessing anyone in any embassy has a base level phone that is physically destroyed/changed every week for sheer data analysis complication.
But ya, don’t text and drive, because that trooper can send your sim to the state in the event of a crash. Or send state level cables. Both are just as important.
everything you say is proven in that movie "2,000 mules". Your comments on that movie would make a good video. Go For It.
but then I've know how that tracking works once I figured out google traffic maps were based on where cell phones were clustered on the roads long ago.
It’s actually a special service providing visualisation of the tracking. Networks cannot function without constant tracking of all the handsets and detailed knowledge about which BTS is the best to route the call to.
Seems that if we need to carry a phone, it needs to be wrapped in a mini Faraday cage....or lead lined pockets lol
Faraday bag from SLNT, leave SIM phone in the car or backpack when out and about. Physically carry another phone with no service, connect to public Wifi with VPN+killswitch if absolutely needed. I take this seriously, and people get ignored for hours. Oops.
@@noxxum so you use the Phone with sim as Hotspot?
I’ve also been looking at the SLNT faraday bags, have you tested them to verify that they actually work?
Faraday bags are a complete waste of time. With an Apple or Google Android phone, you are tracked by either of them the moment you take the phone out of the bag to use it. Algorithms then analyse that tracking data and can probably work out how you got to that point from the last time you took the phone out of the bag to use it.
Save your money and do your research. Buy an Android phone that you can de-Google and carry that about with you. Or buy one from Rob. In either scenario, wifi triangulation doesn't work as long as you don't install Google Apps.
Yes, your cellular provider can track you inaccurately (on 4G) through cell towers but you can't avoid that and the information stays with them anyway unless legal authorities subpoena the information.
It will be different under 5G where tracking by the cellphone provider will be a lot more accurate - so hold off on moving to 5G as long as possible.
Yes only if absolutely needed when out and about, otherwise it only gets checked a few times a day, never connects to wifi(the SIM phone) That's what my other phones are for, with no sim to disassociate it with an IMSI.
One of your best! Cheers and Well Done!
In Ireland there is still 2g available on mobile phone networks. At a rural location I visit occasionally, the only way I can make a halfway decent voice call is by manually selecting 2g. The phone always goes to the 4g network even though signal is too weak to carry a voice call.
If the network, towers, infrastructure etc. exists, why remove it ? Is maintenance very costly?
Based in the UK myself. 2G is still available but being fazed out (unless it already has been fazed out). I believe they want to repurpose the 2G wave lengths for other things (remember reading something but can't recall what specifically) IOT or possibly tv?
@@IOTWVUVWTOI you can select 2g only in settings then perform a network search & find out what 2g is around in your locale.
There are apps to force your network to stay on 4g no matter how weak the coverage is, if that’s what you want.
Yes - maintaining that infrastructure is astronomical cost.
Great info will be checking out your phone's I have come up with new problem with security cameras reqiring wifi and our cops in Paul's valley ok driving around accessing cameras remotely changing settings retreving audio, video, turning off as criminal activity are going on, deleting and other violations of civil rights without warrants going after low income people
You never want to use a WiFi camera, as they are all vulnerable to being disconnected using a deAuth attack. You want to run hardwired IP cameras, and really think about whether you need remote access or not.
The XMPP protocol appears to offer exceptional messaging tools, with audio and video support by most open source apps supporting the protocol. Combine with wifi and/or an anonymous data only service --why wouldn't this combo be just about the best solution available for private and secure communications???
Yea xmpp is really a great option it's weird they don't get the credit they deserve.
@@ananamusly what is xmpp protocol if you don't mind me asking? Is it like sms or iMessage?
The other nice thing about having your communication routed using XMPP, is that you're not forced to use a device that has a simcard slot. I'm able to get my voice calls, text/MMS on a laptop over Ethernet.
You mentioned "programmable SIM Card features"? My biggest concern, after watching this video, is the default 3G access. Is there any way to "program" a SIM Card for a current 5G phone, to refuse 3G connections? I have a switch in Network Settings that permits me to do this with 2G connections called "always allow 2G" on/off. Is there a way to do this at the 3G level?
Paul M.
Atlanta, GA
There is no 3G in the US
Great information Rob. Thank you.
I've often thought that, with all the attacks on our personal privacy these days, combined with all the censorship & biased perspectives on current issues being put out there by MAGA - FT (that's Microsoft, Apple, Google, Amazon, Facebook & Twitter - not that other "MAGA") - some of the scenes from that 1976 movie "Network" (starring Peter Finch, Faye Dunaway & William Holden), could appear very relevant, even today.
There is one very memorable scene in the movie, where Peter Finch, during a live US TV broadcast, encourages viewers to stick their heads out their windows (just as he has done) & shout "I'm mad as hell, & I'm not going to take this anymore!" The outlandish tactics of the Peter Finch character in previous live broadcasts had garnered a massive viewer following, so when he encouraged his viewers to stick their heads out their windows & shout that message - literally millions of people around the country did that.
If only a similar reaction could be invoked in people, in relation to all the attacks on our privacy & the censorship of big tech!
Does a faraday bag help at all to cut down on tracking when the phone is not in use? It would be interesting to see a video on that from you.
I keep my phone in one as I travel about. Use an old garmin for maps and only bring it out if I absolutely need it. Looking forward to getting my degoogled any day now.
Yes it does!
There is a documentary called 2000 Mules where they geta lot of info by tracking phones
Isnt the best to use a seperate phone with sim as Hotspot for the Daily driver?
Maybe also with vpn/ Tor?
that would be an option too
@@robbraxmantech thank you very much for the response cuz I was absolutely not sure if that was a good idea
I guess it would help but still not be perfect?
Cancel cell service and use a landline ...
@@summerforever6736 You can't get landlines anymore
What would be the purpose of such solution? The SIM card in a hotspot device still has an MSISDN associated to it and is linked to an account and you pay for it. Unless it’s prepaid with a scratch card - I don’t even know if they exist anymore…
Thanks for the info, sir!
I am in Canada. Can I use Volta with a blackberry Bold?
the idea of Volta is a phone that can run the Volta app so no.
I am curious if a network can send a signal to disable the phone, putting it through boot loop unless you go into recovery and do a restore. But it would go back to boot loop again once it connects to network. I Faraday caged my phone using anti static bags and it wouldn't loop anymore but once bag is opened, one min later, would go back to boot loop.
I'm curious sir... have you reviewed 2000 mules? If so, what do you think of their data gathering?
A Brax sim would be awesome!
Would allow Brax to be targeted
You can’t have your own sim without cooperation of the network owner…Brad sim would be only a regular sim with different logo on it
Your very wise, good info as always, thanks.
Thank you for all your excellent information.
Sorry. SIM card does not identify mobile subscriber. It identifies an Account. The Account is assigned to a subscriber. If you want to be strict technically.
KI stands for Key Identifier as far as I remeber.
Removing SIM card will not help you in ways you think. Handset still broadcasts IMEI - even without a SIM card…
Rob, microg vs Gapps vs nothing?? Pros and cons? Are there microg security or privacy risks? Talk about this during a livecast please
He has already done this on several occasions. You just need to be less lazy and more proactive by searching through his videos and paying attention to the content. You're welcome. You can thank me later.
They can ACTIVATE The esim anytime ON any Phone eveni iphone and use that to monitor ON IPv6 you can tell by removingThe sim and you Will see The cellular icon still transmitting. I dont know if airplane mode Will disengage The esim ON The iphone or Not as The icon blocks The cellular data symbol.
You're talking about the device using cell data when no SIM card is inserted? Are you sure that this has anything to do with eSIM? It sounds like it could just be basic cell connection that can occur without any type of SIM at all (such as used for 911 calls).
I had 2 phones twinned by major companies. They were turning on the camera and filming me and putting it up on some website. I couldn't get any new phones or compensation from either company and I paid for the phones new. These companies are completely out of control and abusing innocent women.
Whoa that’s insane how did you find out?
Dude!! You're a legend
Thank you so much for the information but I also was expecting the wonderful piano jazz ♬
I had to figure this out for myself. I really wish would have heard this one a year ago when you posted it.
I wonder why there are no decentralized sim cards a bit like Tor or VPN works. You have a local number but when people call you it has to go through other layers of ghost numbers which change every time you receive calls.
That would make tracking your location, wiretap, etc practically impossible? If that exists please let me know the company that does that
Ooo... I like this idea!
It’s simple. Networks belong to telco companies and they don’t want such functionality. Also - that would introduce additional traffic on the networks - and traffic equals $$$ (bandwidth). Also - the network’s immanent feature is being able to identify location of each handset at all times in order to set up calls. If the network loses track of your handset - you can’t receive calls!
TYVM Robster. 😎
Hey Rob! As a public figure looking to be seen and who is searching for the opposite of privacy protection because my information has already been plastered all over the internet. What would you say the best way to get people to see your online content would be? I mean every platform I post my content always seems to hide my stuff and having been on social media for over 15 years I am tired of it. Any tips?
SEO is general. Better meta data, key words, titles and descriptions. Modify the file meta data prior to uploading to include key phrases and words used on search engines... just a compete novices take. Hope it helps some at least bud
@COBRA Thanks for sharing what you did and "Hello" from Maine. I even get more views than 8-10 just by showing the local scenery in short videos. I have yet to 'put myself out there' using face and vocals though. It's something new and I'm 65...old. I don't want to sound like a bumbling or 'boomer"ing idiot and then have to edit the whole thing just to state some decent-sounding things. I miss out on a lot though because I'm so 'extravert' it's pathetic. I grew up with a back yard swimming pool, in L.A., and I wouldn't mind having a decent-sized, friendly set of internet "friends" that took time to "like" me. My 69 count subscriber channel does get dusty at times and the frigid climate wasn't that helpful videoing the Back Cove this morning at 6:30 AM, I'll tell ya.
Please excuse my ignorance, but if I get a Brax phone do I just go to my carrier and they will install the SIM card? Thank you
You can get the SIM card and install it yourself! It’s really easy
Good info.
So volta will work worldwide then?
Modern cell phones have many cpu. Can the phone use 4-5 cores to maintain security integrity and privacy?
How much artificial intelligence is needed to identify attackers as fiend or foe? What encryption does
military use for radio signals that consumers can't have? *How can wi-fi be mil-spec secure?*
Seems like they really do only identify people as _"fiend or foe"_ - no friends in their books
Great video as usual .... but opps..on the volta having any data only plan. And the talk and text (no data,) is the only plan at 19,99, And The unlimited Talk and Text and data is somewhat cheap at now special, $39.99 per month.
Still a great deal for security, no KYC... if we can bring our own phones!
Thank you for your INFO!
I'm not recommending Volta. I'm getting so many reports of sketchy actions
@@robbraxmantechThank you for the 12 vids I've had time to watch, so far!
I wouldn't use it either, ..... as I rather use Element, or Briar... anyway, I only like "opensource" apps, and if others don't...
I don't need to converse with them anyway! LOL!
Again thank you for your vids!
My phones can't be tricked to make calls or send messages. The 4G/LTE can be intercepted directly, no need to disable encryption. Reason for which I am developing hardware voice encryption for the security phones I make.
Can you discuss ESim please
Thanks
So if I get a Braxx phone, a new SIM card with new number, if I talk, text or message my son, on his IPhone, wouldn’t my new information be data mined thru his contact info?
the question is: Who is mining your data. Not every threat is the same.
I have the same question... wouldn’t ‘they’ be able to figure out that my iPhone is no longer in use, the kids and hubby are all texting and calling this new number and we are all on the same carrier plan... 🤔 yup! Must be Mama. I want to be as Ghost as possible, yet still have the ability to connect. Am I just dreaming that it’s possible? From what I’m getting here is they will probably know that it’s you but not be able to mine any info of you. But couldn’t they just retrieve the other parties texts etc?
@@robbraxmantech any of the Alphabet Soupers?
@@cinsforgiven7you could do it only if all three of you buy prepaid cards and use scratch cards to recharge your accounts. But then - you still call to your friends, and they put your new numbers into their contacts app and Facebook reads it. There you go! The anonymity is a myth and can’t be achieved in reality with majority of population being completely oblivious to what’s going on…
@@cinsforgiven7 it's possible in theory, but if your previous device stop communication and another device appears in its place it doesn't mean that they should (nor would) assume that it was the same person. For example it could be someone cutting a relationship and starting a new one at the same time (maybe most likely with romantic relationships but certainly not exclusive to that).
The scary part is how Apple or Google (or even another OEM like Samsung/HTC/ASUS) could read contact list information such as e-mail address, first name, last name, nickname, address, etc.. Combined with the scary AI that exists now (or at least scarier in the near future) and other contextual and/or historical information it could make some very intelligent guesses. An AI system would probably recognize "mom" as his mom, and instantly connect all that old data to you unless there's any indication that he's ever had 2 moms. But short of using AI to do this (which I think they might not actually be doing yet) I think it's unlikely that they could do much connections aside from specifically verbatim first name + last name connections. I'm sure they use AI for things related to this (such as tying names to numbers and numbers to accounts, deciphering/sorting duplicate names that have different numbers, and cross-referencing stuff and making relationship webs, but _not_ deciphering what "mom" means when no name is provided), but I have doubts that they would be using it for specific user guessing and relationship guessing (like deciphering "mom", "PJ", or even just "kate")
Does sensors off tile help you stay private?
Yes.
@@robbraxmantech could you please explain how that works. Thank you in advance
Thank you
We have dedicated people to take care
i was wondering why i could easily find prepaid burner phones and sim cards in 2004-2006 but nowadays its almost impossible.
Gubbernment regulations!
Great content
Just checked Volta's prices, their cheapest $19.99 plan has unlimited LOW speed data in Canada 😃 & USA, but unlimited HIGH speed data is $39.99 in the USA... *_in Canada it's $199.99 / MONTH!!!!!!!!!!!!!_* Canada is worse than the 3rd world for cell plans, especially data.
Hi, Is a Tesla Phone safe to use? Having trouble understanding all this.
No such thing.
Is the audio normalized enough? It seems louder at the start of some sentences, and a lot quieter other times. It could be my ears or old speaker though, but normalized audio is Great.
Good info. Kinda depressing, but good. PS. getting an affiliate link for Volta might help out with the bills?
I wasn't specifically listening.probably an automatic gain control on the camera..
Excellent video. I saw you mentioned Volta wireless in one on your videos, do you recommend their sim card with your phone Brax2? I saw they also have phone now. Do you have review on that?
They have bad support. That's what I heard. So not recommended
@@robbraxmantech Okay, thank you for letting me know. Any recommendation on what to use with your phone? I like the idea of a data only sim card as I find wifi actually gets hacked into quite a bit. Any thoughts on this and recommendations regarding phone company to go with? Are there any good phone company's that are not big tech? I guess not? Appreciate your help.
Other carriers can offer data only. You may have to tell them you have an iPad
@@robbraxmantech Okay, Thanks so much. Keep up the great work! Appreciate you answer comments too. 😊
The mobile phone without a SIM card still communicates with mobile network. You said a 911 call only becomes visible when you initiate a 911 call, but I’m not sure this is true. Are we sure a unit can’t be seen and tracked even if you remove the SIM card? My phone without a SIM shows that it’s still searching for cell towers. It’s unclear to me what is going on.
Of course each handset connects to any available BTS without a SIM card installed. It is handled as a roaming device and not only can be but is tracked. Networks immanent feature is tracking handsets. No calls can be routed when handsets are not tracked 100% time.
Hi Rob. I'm from EU. How can I be anonymus. On my smart phone. Wich phone shold I buy? And wich Phone.?
Consider a BraX2 phone.
@@robbraxmantech Thanx Rob. I have one question more wich Linux OS shold I use for every day just Internet, e-mail. And wich is social network is private or is used by people wich like private and anonymus chat. Tnx for rpl.
@@robbraxmantech Yeah sure. I will buy it. I'm putting money on side. :D This will be my fifth smart phone. I always had a Nokia burner phones. Now I have Samsung and I can't install AOSP.
@@mobilusfontas3290What means AOSP?
my next door neighbor gave me a new cell phone that he could NOT be heard on when trying to call someone and the service provider VERIZON could NOT fix it so he had to get another phone.
since the phone does NOT have his sim card, the damn thing has the WRONG DATE AND TIME !!! have taken the battery out but have NOT took the time to strip it down yet to recover the metals!
it is an ORBIC RC 2200L
Great video...thanks...
When are you going to have more Brax privacy phones?!!!!!
Think about it. The 911 emergency is jot a one way initiated connection. 911 dan call a no sim phone back. Now think how it couid do that if you have no issued number or idea. They use the cellular hardware MEID code. It functions exactly how a phone number or sim would function. It also can enable a passive call connection to the phone. It is how a sig int team can target and use a phone as a eavesdrop device even if the sim is removed deleted whatever. Same goes with the powered off unless you have a removable battery or a direct physical on off switch that physically cuts power from the battery. It has to ge an addonnmod on 99.9% phones
So I wasn't being paranoid cutting up the sim card I used to transfer my number to google voice?
There's a lot of extremely interesting & useful privacy information in the above video.
I've often thought that if I use a new non-Google (Google-free) mobile phone without ever putting a SIM card in it, & just use it on free publicly accessible wifi internet connections with a VPN, together with security-conscious communication apps that do not require a real identity, then it would be very difficult for me to be identified by using that mobile phone.
The phone, of course, would still have its IMEI & serial number, but these are generally not recorded at the point of sale - especially if you purchase the phone at something like a supermarket or variety store, & not a store belonging to one of the mobile phone carriers. To make the purchase transaction even more identity-free, you could easily purchase the phone using cash &/or have a 3rd party/friend purchase the phone on your behalf, in case there are security cameras in the store. Or if you purchase the phone on-line, you could also use a mail forwarding service - though the seller may still have/want your name & other contact details.
Of course, only being able to use the phone in conjunction with free public wifi internet access (which usually won't require any personal details - although some may) may prove restrictive at times, especially if you're in an area that does not have any free public wifi internet access available.
I regularly use free public wifi internet access when I'm out & about in the city (CBD), or on public transport etc. & in some restaurants/cafes etc - & it usually works very well. But occasionally I'm in areas with no such coverage - in which case it would be helpful to have a mobile/cell data internet connection available, if it's necessary to use a mobile phone in those situations.
But it's not a phone with a SIM card in it, is it? It's "just a computer" in which case stop thinking too much about it and just put Linux on a small laptop and carry that with you.
With respect, you're demonstrating a lack of understanding of the topic anyway because on one hand you're trying to stop yourself being tracked but then you use public Internet access. You say it "usually" doesn't require login but that just says to me that if you have to log into a service to use it because of no choice, then you will do it as a last resort - and that's a complete "no-no" when it comes to privacy.
I refuse to go near public wi-fi, I simply do not trust it because there could be someone sat only a couple of feet away from me innocently drinking coffee with a portable wifi access point upon their person and waiting for people to connect on. If anything, logging in with an identity might actually help to prove that I am connecting to a real access point, but then I am providing an identity that I don't want to provide.
To me, the safest solution is to carry about a de-Googled phone that you just have for phone calls, SMS, media consumption and a few Open Source applications from F-Droid to, say, sync your contacts list with your home server running NextCloud. Do everything else on a Linux laptop, use browser segregation and fake identities as Rob recommends, and when you need Internet access on the go, switch you phone on as an access point and use the data allowance in your mobile contract.
This is really simple privacy stuff here, again with respect.
@@terrydaktyllus1320 Thanks for your comments. Actually, I already practise many of the privacy recommendations previously suggested by this video channel - including browser isolation on both my mobile phone & home laptop PC.
The concern I have with making phone calls, SMS & internet use from a mobile phone using a SIM card that also has mobile/cellular data, is that when you use that SIM card/phone number for those purposes, it then links to your phone's IMEI number in your mobile phone carrier's records, & it then usually displays as your IMEI number in your on-line account details with your phone carrier (at least, in my case, it does)
Of course, once an IMEI number can be linked to a SIM card/phone number which, in my country at least, will also have a real identity associated with it, someone could then continue to use that IMEI for tracking purposes, even after the SIM card has been removed from the phone - because they now know who that IMEI number belongs to.
As far as internet access using free public wifi is concerned - I don't just connect to any (unknown) wifi internet connection when out & about - I only connect to known sources of free wifi internet such as that provided & advertised by shopping complexes, restaurants, & public transport - which advertise that they offer free wifi internet for their customers etc. And I can't say that I've ever had a problem with them. Most of the free public wifi internet connections I've used do not require people to log in using a mobile phone number or email address as an identifier. If they've requested such information at the outset, then I do not use them.
I was not suggesting using free public wifi internet access as a last resort only, but something which might be used to ensure privacy, because perhaps then, there would be no way your actual "identity" (which is at the crux of the privacy issue) could be revealed using that "combination" of methods I mentioned in my original post. While in theory, they may be able to still track your device, if they do know its IMEI, if they do not know the identity of the person to whom that IMEI belongs, there probably would not be much point to such tracking.
Also, even though being used in the way I've suggested, may make the mobile phone seem more like "just a computer" than a mobile phone, I think someone carrying a mobile phone is likely to be seen as less "unusual" than say, someone carrying even a small laptop computer with them.
@@janburn007 I would say you understood everything. And your strategy is great, especially avoiding any link to your person by buying with cash. I would just suggest that you use an OS which allows a complete disconnection from the mobile network. This is important even when you are not inserting a sim card. Like a Wifi-only device. Some OSes even offer randomization of the MAC-address on the Wifi-interface, which is even better. You also understood the concept of end-to-end encryption, in contrast to Terry, and you can safely use any public, open network if you have a secure, hardened device. Keep the good thoughts and thank you for your great insight.
@@ralfsteiner7751 Thanks for your comments & extra suggestions for privacy. I did think that some of the suggestions made by Terry could possibly put me "in danger" if I were in a "Jason Bourne" type situation. In fact, if Jason Bourne had actually followed some of Terry's suggestions - he would have very easily been caught! So it's probably just as well that I would not have followed those suggestions of Terry's, in any case - as I could see their flaws. Some of those suggestions made by Terry sound like a "downright dodgy daktyllus" - LOL!
I like the data only idea you could get a Mobil hot spot and use data only service. Maybe magic jack could work on these type of networks. I never got one sales call on my magic jack phone number. 73
I purchased a brax2 for my son. We went to Tmobile store and got a sim card and a phone number for it, added it to my normal phone plan but it does not want to connect to the Tmobile network. We spent an hour or so on the phone with Tmobile tech support, they say everything on their end shows the sim is operating properly and should be able to connect to the network but it will not connect. We re-watched your RUclips videos on trouble shooting and updated everything, reviewed all the permission and still can't get it to connect. Can you offer any suggestions we can do to fix this issue?
Just make sure it is not a prepaid. Standard plan should be fine. And check the APN to make sure it is correct. I am on Tmobile
@@robbraxmantech what video should we watch to make sure the APN is correct? I just got my Brax2 phone, and plan to switch to T-Mobile in 2 weeks myself. After watching your whole video, I’m thinking of switching to VOLTA instead of TMobile.
Which route would you go today? TMobile or Volta for calls?
Thanks in advance for your guidance on this!
@David Roy Newby I'd consider Volta. I have not tried it yet.
So your Brax2 phone does not support prepaid? Or does not support prepaid only when a second phone is added to a plan? I am have TMobile prepaid plan and am gathering info to purchase a Brax.
@@robbraxmantech I've just watched this videoand downloaded the Volta app. I have an app on my phone called TC (Tracker Control) which tells me if an apk has any trackers in it. It picked up that the Volta app has 5 Google tracker libraries in it. That's a bit concerning...and I cannot find a contact on the Volta dite to ask them about it. I have a screenshot of it but no way to attach it here.
NOTHING is totally safe! My pet choice is an obsolete package of phone and sim from a Dollar store. Took an hour to activate but mainly to not so smart staff. Non of my ID's were asked but just the lacation was sort of suggested to be updated for the cheapest calls. So you pay more for extra privacy?
If someone got a data only + VoIP SIM, and wanted to use the same phone already being used on an existing SIM, will the existing SIM stop working? That is, will the phone number work on both SIMs?
yes both
Nope - phone number (MSISDN) is associated with SIM - one to one. The VoIP or data sim card also has its own MSISDN number - and it’s different from the MSISDN for your other SIM card. Both SIMcards will work but in a different way (the data card will not have ‘voice telephony’ service associated). Rob - what are you talking about?!?!
Yeah I think rob misunderstood the question. The number on the old SIM will not work when that SIM is not in the device. You could in theory _port_ that number to the new SIM, but obviously you're not talking about that sort of situation (because it's a data-only SIM). For both SIMs/plans to work simultaneously you would need a device with more than one SIM slot. That or regularly swap SIMs (if that is even a viable option for you)
Although there's two other options as well: 1. porting your cell number to the VOIP service that you are using. Some services do allow this, but it will almost certainly require a lot of verification, so hard to remain anonymous to the VOIP provider if that is important to you. 2. If your device supports eSIM then you could get an eSIM plan along with a regular SIM card plan.
Braxman has voiced some distrust of eSIM which is understandable, but from what I can tell there are no direct/proven privacy harms in using it as long as everything else is done in a privacy-conscious manner (such as paying for the eSIM via Monero or a prepaid credit card, assuming that you even care about having that high of a degree of privacy in the first place (privacy from government investigation, which I think many people don't care about compared to Google/Apple/Meta/Microsoft, etc.))
I work for a popular wireless carrier. How come people keep coming in with no service and I have to replace their sim card? 9 times out of 10 replacing the sim restores service. Just curious why they keep failing.
SIM card gets damaged and no Ki or MSISDN is presented to the network - making it impossible to authenticate the service.
However doesn’t the baseband processor have full admin control over the application processor?
No. There's a full detailed discussion of that in the Advanced Playlist
How can you call this phone privacy orientated if the camera is embedded on the screen? Should have gone pop up camera for the front and a back slide plate camera for the back.
What about esims
Rob how to detect a rerouted message and where the imsi catcher is at?
You can’t
Would turning the SIM off via SIM Manager on Android (13) achieve the same as physically pulling the SIM card?
I played The Sims 2 a lot in high school.
I'm worried about government telling me that I "pinged a tower" in an area that the government claims I'm not supposed to have been, and then the government using this accusation to criminalize me, even though the Google or Apple logs would show the accusation itself to be false. It seems like we all need to be surrounded by witnesses so that the government can't claim that we did something that we did not do.
hmmmmmmmmmm
Where is customer service for issue with Brax2 phone?
Hummmmm 3g is still used in other countries? Kinda sounds like we did away with it because its harder to track or something of that nature.
Question: do the new cell towers that have been going up (5G?) communicate with other cell towers only or with satellites or both?
What do you think of EFANI?
What are the issues with an e sim? My new phone has no physical card.
I heard you say one disadvantage is being able to disconnect the sim.
What else besides that?
Harder to switch SIMs… you can’t do it physically
I enjoy being able to buy as many simcards as I want where I live.
What if cell phone traffic was routed through a device that would scrub sim card information?
What messenger apps do you recommend?
Are you professional in hardware handling? I need to know how to build a phone from breakdown or kit type. I dont trust most people who cant explain why other options not being wtong or right but just in theory...
You can buy an LTE modem chip from a semiconductor manufacturer, and build your own phone. There's a couple of open source cellphone projects, where you can build it from scratch, or assemble it as a kit.
@@lihtanwell - then you have to produce your own software as well…
Baseband modems are secretive and proprietary. You won't know detailed contents of the chip nor the code that runs on it. You can make an open source handheld computer, but the cell data part is not viable to do as far as I know. (I might be slightly out of date on this info though; I think people have been working on it, and it's possible that there might be limited functionality open cell modems now, but probably only old protocols that will have poor performance or no service at all anymore due to End-of-Life)
21:20
Do you think eSIMs are the future, so everyone will eventually be unable to avoid all this?
That's always a possibility. It's much the same way they shut off the older network support forcing you to upgrade to a phone that's likely tracking and listening to you at all times.
@@lihtanwell - phones don’t listen to you outside of moments when you talk on them or use a keyword for ciri
@@ipodman1910 You're wrong about that. With modern smartphones, they become full-on surveillance platforms when you install many of the popular social media apps. The FB app for example, is listening ALL THE TIME.
Do i need a vpn on all the time on my phone or would you people suggest just when browsing or going 'online (never use wifi)' ?
VPN absolutely needed when on Wifi
@@robbraxmantech Thanks Rob, I more talking about when the phone is just on the carriers 3/4g network ?
Love this channel ❤
🛡🗡😇
Yeh .... are u Remember deyan kalievic ms DOS brute force last 4 bytes 😅? To have multi sim?😁
At 1:10 you mention a phone that doesn't reveal your identity, does it come with your VPN built in? Does it use the Tor network?
I haven't been engaged, on this Channel as, I should save them phones where you can take out the battery lol!
Where can one obtain a Volta SIM card?
OK OK Rob all very interesting info (that I can find in internet) but where is the magic there? Where is the special tip's to avoid issues etc
Rob is selling bit of a snake oil here. You can’t chaythe way networks were designed - their immanent feature is tracking handsets and there is nothing that can be done to prevent it if you want your phone to be functional.
@@ipodman1910 What _can_ be done is hide identity though. When they don't know anything about the owner then they aren't tracking the owner, they're just tracking some random device that they don't know "anything" about (aside from basic device ID stuff)
Does turning off location, turn off data, turn on airplane mode, then turn off the phone, will stop from locating you?
Pretty much yes, although there is a possibility that phones turn on their radio from time to time to send a ‘ping’ for tracking. Of course without users knowing about it.
@@ipodman1910how to shut down this radio tracker. I received a bill to pay for this service. My service provider tells me that it is a tax, which I do not believe. What can be done about this ?
What about if the phone says 4g?