I was talking to my brother across the country just last night about a book I just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. Akerace Drill
try saying i fancy a caribbean cruise several times, i wish we could go on a cruise next year or shall we book a cruise. I tries it and not to my amazement I was suddenly flooded with cruise adds. I never typed anything in just said it allowed.
My best friend was merely talking about names for an animal in the household (not on the phone, no other listening devices) and that name came up the first time they used the phone after that.
@@stewartpalmer2456 last night I said “seriously” to my boyfriend 10’ away from my phone. Siri said “ Uh huh?” So unconsciously I started whispering LOL
@@stewartpalmer2456 we did some experiments on the UK and Serbia - mentioning obscure products in front of a couple of open laptops with FB running and sure enough ads popped up next days, and even emails. I discovered subliminal messages on RUclips videos (almost certainly illegal), pre- programing people to support the Ukraine in the present conflict - and got friends across Europe to freeze-frame 'infected' videos to look for it - the results were different from country to country as to whether it was there or not and some other parameters (I don't recall them all precisely now). I also found a subliminal message telling people to vote for the Labour Party, years ago, in one of their seemingly innocent political brpadcasts - again it was almost certainly illegal. Whether it's a criminal offence or not I don't know, but having wasted my time reporting clear political fraud in the UK before, with police and electoral officers just not giving a toss, I just didn't bother to report it, sickening though it was.
@@78tag Yeah, that happened to me having a private conversation in my home with a friend. He was due to receive a lump sum of money and jokingly said he would buy a pre-paid funeral plan with it. Later on when I went on my phone, the ads I was getting were for companies that sell pre-paid funerals.
He's that 1 big brother that in public defends his lil brothers from other bullies but behind closed doors, beats up his lil brothers that are too scared to tell the neighbors.
My stepfather had a Jitterbug flip phone. He switched carriers and they wouldn't use it, so it was shoved in a box for several years without being able to connect to a cell network. I found it because I kept hearing this weird noise - which turned out to be the LOW BATTERY sound. It still had several percent battery life after YEARS.
All the time it was in the box the microphone could pick up sounds, voices go easily through a card board box, all the time the microphone has been busy with collecting data, how many people there are in the house and at what time they are up or asleep. So now and then it connects to a network to send in a report. Then it switches itself off again, waiting to send a report next month.
@@larryboyd1872 Not all microphones need a battery to operate. Once I won a cheap watch on a county fair, in less than a year the battery was empty and the display stopped. A new battery would cost me ten times as mutch as the value of the complete watch. I stored the watch in a drawer somewhere. But many many years later, every time on a certain date the alarm would go off and it beeped. Sometimes an old battery is not completely dead.
I'm a young computer programmer, yet I prefer the Jitterbug UI over stock Android, despite it being designed for the technologically challenged old folks. It's straight to the point and requires few clicks to do things.
Already being worked on which is why it stays at home and I use an mp3 player and a digital watch for out door adventuring since I do most stuff on social media or on my email these companies are gonna learn the hard way.
I am experimenting with two solutions. The first is a dumb phone. It is a clone of an old Nokia (real Nokias are also available), and I don't even have a data plan for it. I pay less than $10/month for unlimited text and voice. However, nothing will keep your location from being tracked by the carrier, as they can triangulate your location off the towers. And the truth is that your SIM has its own processing power so who knows what it may be collecting and sharing. The second thing i am experimenting with is a FairPhone. It runs a de-googled version of Android and it has a lot of powerful privacy features. I really like it, but in the US it will only work on T-Mobile or one of their MVNOs. I am paying less than $30/month for unlimited voice, text, and data. However, another bonus is that it is user repairable with nothing more than a small screwdriver. In the U.S. it is sold by Murena, everywhere else it is sold by Fairphone or Murena.
It gets much worse. My old flip phone used to use 0 battery power even if turned off for several days, but new smartphones seem to use about three percent of battery power overnight whether they're turned on or off. It seems that turning off only stops It from responding to user input. I suspect it is listening, tracking and reporting on what I do even when it is turned off.
@@johnmoran1481 that's not a real test. The phone is going to spend a lot more energy restarting than sitting idle in the same time. It's not unusual that if you record the starting battery %, shut down, start, and record the % again when it's ready, the % will have decreased.
@@weevilsnitzyes but leave your phone off for a couple days and you’ll lose more that just that bit of start up juice. So it’s doing something. I went hunting with zero cell coverage so turned my phone off at 95%. When I turned it back on 5 days later it was under 80%. It’s an iPhone 15, that tells me it wasn’t really “off”.
Nobody turns their phone off. When you press the button on the side and the screen goes dark, you’re only putting it to sleep. If you actually turned it off, then it will stop using power.
You are only seeing the front end. There is a back end to every phone, you will never see. I tried to find the actual case (it's discussed here on YT someplace) but there was a court case where a man had an accident and he was charged with texting while driving (distracted driving, whatever they call it in that state.) The man swore under oath he was not texting. His phone showed no sign of texting at the time of the accident. To make a very, very long story shorter, the prosecutor subpoenaed the AT&T records which showed the phone DID text at that time. The defense lawyer put the AT&T engineer on the stand. He testified under oath that every phone actually has 2 or 3 cpus and at least 2 operating systems (if not 3) and that the user only sees one of these CPUs and one of the OS'es. The other 2 or 3 run in the background and he testified it was one of these other OS'es in the background was sending the texts not the man who owned the phone. The engineer was asked "Who did the phone send the texts to?" The AT&T engineer said under oath, "I can't tell you that." The lawyer and witness went back and forth until the engineer repeated the same answer several times and eventually the judge said to move on. I also have a friend who worked for AT&T and he's told me things that would send a chill down your spine.
Indeed so the chills down one's spine. No network equipment manufacturer is allowed to resell their equipment without the firmware and NOS being vetted by certain governmental agencies. The NOS must have a backdoor in it - albeit being un-anounced and denied by the supplier. Go figure how the NSA et al use this.
@@stickman-1 sounds like a low key testimony that it’s Government and / or the phone companies getting your information..(likely in cooperation with the government)
Always be on high alert when something was purposely misnamed from it's actual purpose. Especially when the "name" seems more trusting than the actual purpose. For example, "app measurement" seems like like a neutral app to help your phone measure app data. But it's actual function is to track your private data. The same goes for politicians. When the majority of them vote for a bill that is named something that is trusting, make sure it does exactly that and not the opposite or else. Always remember that you are in control and everyone else benefits when they take that control away from you.
@jimcabezola3051 Just curious . . . What device did you watch this video on? I've never carried my phone around very much. The main reasons are it's a pain in the rear (don't lose it, drop it, or accidentally leave it somewhere. I also don't want all the interruptions of my time by notifications, calls, & texts which can become 'like a ball & chain.' The other reason is we KNOW that EMF is NOT harmless whether it's ionizing or non-ionizing. If my phone is in my purse and I'm driving somewhere, it's only in case I MIGHT need it or want it. If there's a long line at the bank or grocery store, I'm glad to have it to pass the time more quickly. More often, I forget it's there. At home, I spend most of my time outside. I don't take my phone with me to mow the lawn or clean the pool, etc. It can remain off for several days at a time, usually until I figure I should probably check for msgs. Meanwhile, I have 3 tablets that are NOT synced to my phone & those are the devices I use the watch YT, Google something, play music or games, email, etc. Sure, "they' can capture my on-line activity, what times I'm on or not on, but my location is gonna be pretty boring. My tablets rarely go anywhere, and when my phone is with me, it's usually off. Curious to hear your logic, etc.
It's sad that we have gotten to a place that this is acceptable and few seem to care and little is being done about it. Also on your next test see if after you "uninstall ???" the app such as TikTok does it still keep stealing your data.
I use a degoogled phone [uses android open source project instead, which has no android apps in it] and don't have any apps on it that can compromise me to corporations unknown. No tiktok, amazon, etc. I've been trying to convince people about the dangers of their phones and I've never had one who appeared to be interested in remedying the problem. people think about Security and assume that Privacy is the same thing. Many 'experts' on line don't seem to know the difference either.
@@robertsandy3794 Pihole and similar DNS solutions are not really suited to monitor such kinds of traffic. There are connections from hard-coded IPs (hard coded in the OS itself) that don't even show up, because there are no DNS requests. To fully grasp the situation, you would need to monitor the traffic with something like Wireshark.
Normal people wont trade convenience for "security-holes", unless they have been in those "holes" themselves. People compromise easily when they dont see the immediate risks, let alone if they dont understand its working and effects. Education down to the basic is the only way, but not everyone will be willing to learn. We win some, we lose some. Saves what you can, but know when to let go.
I have a tracker detector and blocker running in my phone. Google is in Everything! To be an Android app producer, you must allow this. Facebook allows sometimes a dozen trackers at one time. They dont even directly handle the data they scape. Your phone is 24/7 surveilance.
Tracker Control and Warden are 2 apps that can check for spyware, well, most apps have them. But try those apps out, can help you block ads as well! It can give you a lot of information as well. - Darkijah
As a Technician, I understand that the cell phone might seem like a concern, but honestly, it's the least of our worries, especially if you’re relying on off-grid solutions. Just think about vehicles-they can be so intrusive, and then there are the Flock Cameras... I could go on! Even the convenience of food delivery services like Uber Eats adds to the mix. Sometimes, it feels like we long for simpler times, perhaps even a return to using pigeons to send messages! 😂🕊 0:50
I've been using a sell phone for years. Lately, people like you have made me more aware of the dangers of using cell phones and the Internet. The information you supply is very technical, and I'm not that technically savy. I'm tired of all the steps I have to do to keep myself protected. I'm also tired of all the ads and cons. For those reasons and the wasted time being on the phone and Internet, I'm dropping my phone service and access to the internet and the internet access to me. I'm done. I'm going back to a land line.
Great video! Don't forget that DNS is very often used to send data "home" as opposed to looking up an IPv4/IPv6 address. Although originally just a technique for "bad actors" to exfiltrate data, it's now used by "legitimate" companies too. It would be interesting to see if any of the lookups contained long hex strings in the queries that were bursting.
Bursts: most apps can't remain active due to recent Google services limitations. Thus, they use Google services to activate their service and thus have to do their job when Google allows them. As far as I recall, they have 90 seconds before getting disabled again.
It would be interesting what apps are blocked on this same phone after installing the Duck Duck Go web browser and turning on the background blocking tracking feature.
@@Skiddy1963 Eye opener about Duck Duck Go: In particular, it doesn't encrypt search terms in the URL bar. Also, your data can be monitored if you share it on third-party websites or through online forms.
Really enjoyed that video. As you alluded to that not all websites are showing the tracking behaviour because they are employing other methods to extract that precious data from your device.
Depends upon which version of iPhone, and even the iPhone size and other items. Note that when they came out with items such as the iPhone 16 pro max, that they also essentially discontinued most of the iPhone 15 line? iPhone 16 includes items which *they claim* make it more secure in case of loss or theft. Some of these items are not ever available to be bypassed or turned off. For most any iPhone, also consider it is always being tracked by the carrier, always sending out IMSI, always looking for WiFi and Bluetooth, especially low power Bluetooth.
Hey Liron, what an interesting video! Watched till the end :) I would really like to see you make the same video but with an iPhone just out of curiosity :D. But this video and many of your videos in general have opened my eyes!
I can tell you they do pretty much the same thing. I noticed all the domains my phone reached out to and blocked them on my home network. I don't do social media but for some reason my phone calls out to Meta, TikTok, and Snapchat. I don't have anything to do with any of them.
@@dwaynenewton1 what's the phone doing when off you ask? It's doing the same as a guy wearing hat and sunglasses while pretending to sleep in same room as you, listening and watching your every move. Can you say :"hello big brother" ?
Technically speaking they are off. The OS is not running. If you leave it off for 2 months your power level will be near the same. That said the sim uses a very low quiccent (micro) current level But some secure facilities require you to deposit your phone into a copper mesh faraday cage in case it was compromised or you are an agent. RFID tags are powered externally through EMF
I think that you already had a question about IPhones and if they have the same issue. Looking forward to your next video on if this applies to IPhones and how to stop this activity. Love the videos.😊
@@aliceg1212That's only a track record for how much TOTAL data was sent over internet. Also, iOS behaves differently and will have a very different domain list
TBH, this is the reason I have gone back to an old flip-phone. I'm just done with all the tracking, all the listening, all the meta data acquisition. Seriously. I'm about to just get rid of my phone altogether.
@@cheery-hexI don't see how purchasing one of these would assist. They all still will make DNS requests. The real question would be once the phone is not at home, what facility will allow us to blacklist these DNS requests without rooting our phones
Sir, Very informative video. Government should restrict these companies to steal data of people without their permission but these companies are paying millions of dollars to government, therefore, no such restrictions. Ultimately people are paying the price.
@@nickplays2022 Definitely, but isn't it a blackmail that in leau of technology companies are compelling people to accept their terms and conditions. Secondly, if people have more options who will accept to compromise with their data. Yes, government has capabilities to restrain these companies but as mentioned the reason it is silent.
stick a firewall in between your router and modem, and record at least the packet size, amount of data being sent. If you have the means, you can decrypt the SSL and see what is leaving.. but this tends to be expensive gear.
This is something I always wanted to try doing. Very interesting finds, this is one reason I largely dont download apps and just use my mobile browser when possible.
I didn't fully scroll through all of the comments to see if this had been asked yet, but it seems pretty worthwhile to get an answer. What lists did you configure pie hole with and how can we get them?
An absolute eye opener for sure. If our devices are Dopamine farms, does that make developers the Dopamine farmers? Lol Appreciate the video, gained some good insight here as always.
Interesting, but somewhat flawed experiment. 1. A DNS lookup means a connection is being made, but it does not mean any data will be sent. In fact, certain applications create all their connections when starting up. Practically, you don't know what data is being collected and tracked. 2. Of course there will be multiple connections to Amazon subdomains, for different services and APIs. It can all happen at once because the application just creates connections at startup. 3. When you are not logged in, it still is very likely that connections are being made on startup anyway and is not necessarily a sign of tracking. I am sure there might be tracking, but not to the extent you are alleging. 4. Not all API calls are for tracking. 5. For Firebase, some "tracking" is to know what parts of the app you are using, e.g. if you used a certain feature or not and how frequently. This info, in anonymized aggregate, is useful to app builders to improve their apps.
Excellent work! I wonder if the devices save the info and send it back while not connected to the Internet. Also what are all the mystery folders with no items inside doing on my device?
I can only say a little clip from a Pink Panther movie, Man one askes man two, " Does your dog bite"? Man two say "no" Man one goes to pet dog, dog snaps a bite at him Mane one " I thought said your dog doesn't bite? Man two It's not my dog.😜 Same with "my" phone.😁
Those apps might stop but the phone still has services that send data. Mine was sending tons of data to Chinese servers, because that's where it was made. This might depend on the manufacturer, of course.
The fascinating thing I found is that my cell phone, whose expired SIM card is from another continent and has not had service for years... still has full GPS capability. Meaning if I open up Google maps it will show me exactly where I am. And this feature even worked when I was lost in the mountains of Bulgaria.
@@turtlefrog369 ok, maybe I don't know much, but doesn't the tower have to SEND the location for my phone to know where it is? So the tower knows where the phone is 24/7... even though I have no service and the card isn't compatible with any local network.
@@rageonyxGPS satellites constantly broadcast signals. A GPS device then can calculate the distance to the satellite. So the device needs to receive GPS signals from at least three to four satellites, to be able to calculate its own position. At no point does the device communicate with the satellite. Think of it like a TV satellite, where you also only can receive signal.
@@rageonyx cell towers are not GPS. although i am sure cell towers can act ike like GPS satelites maybe. There are different location services being used in phones. GPS, cellular and wifi. GPS is the most secure because its recieve only.
I think a more useful information would be to identify which apps are making those requests and not just which domain they are contacting. For example, if the amazon app tries connect to tiktok, you would blame tiktok although the request came from a different app. Knowing which app is making the request can let the user decide if the app is worth it. Just my thought. Nice video though. 👍
Hey Liron. Wow, that is hectic! I did see your VPN video about a month ago. What I do is keep Proton-free VPN on. On a reboot of the phone make sure is on I almost set it and forgot it. I do understand not everyone will, but it is a good habit to get into. Take care.
I was shocked to see all my Smart TV'S had a hidden camera and microphone that was sending several gigabytes of data every morning at 3am. This doesn't surprise me at all
I basically run my phone like an old Nokia. No banks, like 2 added apps. No location, bluetooth, wifi connected, no auto updates, no auto nothing, yet if I don't plug it into the charger at night, I lose 50% of battery, starting at 100%. If it starts at less than 100% and I forget to plug it into the charger, it uses up all he battery as I sleep, then turns itself off. I have no idea what it's doing. Cheap Samsung, tmobile, Samsung internet.
Modern phones use more battery than nokias, altrough dunno if it should eat up more than my laptop but then again, a laptop uses more processing power to run stuff than a phone. Don't mind it too much.
Great content, just subbed. What about a more deep dive into this? As you mentioned, can you track the ip addresses the phone connects to via our router and see where it goes, can we block them on a network level, can we create a system on our phones that'll block the device being connected to those (without root), etc etc
Very informative video. Question, if I uninstall the app is the phone still sending tracking and marketing requests out once they were installed and turned on? Do they get removed when the app does? A lot of times I may try out an app only to find out that know this is not really what I was looking for and uninstall it.
Liron is there an app that stops this "telemetry" aka sharing of information? With laptops there's spybot anti-beacon that does this but nothing for phones as of yet.....
Some VPN's have a trackers and ad blockers built in. I personally use NordVPN - geni.us/NordVPN-SFC (affiliate link but you do get a big discount and 3 extra months)
Question for future Vids: How much 'stuff' is left behind, still communicating, after you 'delete' an app you once installed? Also, I use Cricket wireless and they regularly try to get me to install some game or app. I can apparently decline them, but what might be getting put on there without my knowledge?
Privacy and data gathering are different things. You might still have everything you're doing being watched, but maybe Apple is a little more cautious about releasing your data to outside companies.
@@mediocreman2 Very true, however it would be interesting to see the practices which Apple are using versus Android - given lots of people trust the security of Apple vs Android.
Hi, thanks a lot for the very useful video! Could you please do the same with a Huawei phone which doesn't have google to see where it connects? Thanks a lot!
Please go into further detail on the different type queries, such as A, AAAA, and HTTPS. What are they doing? And type look-ups, such as CNAME and IP. What's the difference? I too have been using Pi-hole for years. What's even scarier is watch the queries increase once you plug the phone in overnight. Once you begin blocking certain things, it irritates the device and software into frantically pinging those IP Addresses all night. It's like the device knows it's connected to the Internet, but can't achieve it's goal.
Also cheaper solution: If you're the only one in your PC who is upset with different staff, you may use "hosts" file or sinkhole it on router if some more ppl or devices would want to benefit.
The connection itself doesn't mean there's any actual data leaving your phone. You are listing DNS requests and not actual communication, so all of this is BS.
It ok if you didn't understand. The entire point wasn't the data, you need Wireshark to see that. The point was the simple questions: why do so many connections get made? Why are so many of them to ad and tracking systems? It's to make people aware of what their phone is constantly doing. Most people understood this, so this is a you problem. Now feel free to piss right off. K bye
Agree, the connection itself doesn't mean there's any actual data leaving your phone.👍 It's to tell the company server that the data on this phone is ready to be stolen in the next days, weeks or months.😂
@@JoeSmith-pu9hi I am using a Galaxy S5 for everyday. I also have a Galaxy S3 with LineageOS for use as a Walkman music player. You could try a program called Android de-bloater to strip your phone of useless bloat
But you just stated no social media? RUclips is literallly connected with almost every other form of social media, and also linked back to your entire identity.
Well, as someone who was born with the paranoid gene fully enabled, this doesn't really surprise me. I do share your bewilderment as to why so many in such a short amount of time. And this kind of activity is why when you travel, be sure to find out ahead of time what the roaming charges might be, as some countries have very high charges and one might think well I didn't use my phone for anything, so why do I have a $6,000 cell phone charge? If you do travel to such a country, keep your phone in airplane mode at ALL times unless you are using a wi-fi connection. Thank you for the info.
Going to try and see what iPhone does and trying to get other non DNS data too (much harder without rooting a phone which I am not keen on doing but well see)
I realised, that in some case, especially belongs to Google, your phone is listening to the environment too and transfers it to Google. This was when I was near people who talked in ukrainian language - when I then searched for a place, Google maps were written in ukrainian language. Other time, when I was near people, who talked turkish, Google maps went turkish. By the way, PI-Hole seems to be used for MITM attacks...
Phones being by nature a social networking device I believe will always have the problem of unwanted analytics creeping in. I would never consider a phone a safe device for any kind of storage for important information. Edit: Malicious actors will always be seeking to abuse these loop holes.
@LironSegev You answered the question already. I know someone who liasoned for a major software company with the Pentagon. He said that camera technology is way better and more prevalent than any Hollywood drama writer could imagine. The more complex and pervasive a system is, though, the more holes it has If you take it for granted thst you are being watched all the time, circumvention becomes trivial. The arrogance of the powers that believe they are in control is a great weakness. The more data they collect, the greater the noise to signal ratio there is. Most of their tools are for gauging how well they are steering the masses rather than surveillance of individuals in any case.
@ThePhoenixcompanies yup, I pretty much assume I'm being watched and/or listen to pretty much anywhere I go. Like even if I left my phone at home to "not get watched/tracked", I would still be watched/tracked all day. Like the number of people that have smart doorbells/other exterior cameras on home. Plus all store/factory exterior cameras. Plus any bus/other vehicles with cameras. Then of course, work with all interior cameras and punching in. And all stores I might stop at and use a card at. So it's a challenge to not get watched/tracked. I'm sure it's easier to do with more knowledge
I am not worried about Google as much as people cry about them, I am more concerned about apps that can be written by large teams and can do basically anything as long as they pass the Play Store's checks...that should be a FAR bigger concern
The iPhone testing video is now live: ruclips.net/video/k0MHI7pc0hA/видео.htmlsi=htnaS8qY_9l2EyHZ
We need to do an organization that bans these crime against humanity.
I was talking to my brother across the country just last night about a book I just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. Akerace Drill
try saying i fancy a caribbean cruise several times, i wish we could go on a cruise next year or shall we book a cruise. I tries it and not to my amazement I was suddenly flooded with cruise adds. I never typed anything in just said it allowed.
My best friend was merely talking about names for an animal in the household (not on the phone, no other listening devices) and that name came up the first time they used the phone after that.
@@stewartpalmer2456 last night I said “seriously” to my boyfriend 10’ away from my phone. Siri said “
Uh huh?” So unconsciously I started whispering LOL
@@stewartpalmer2456 we did some experiments on the UK and Serbia - mentioning obscure products in front of a couple of open laptops with FB running and sure enough ads popped up next days, and even emails. I discovered subliminal messages on RUclips videos (almost certainly illegal), pre- programing people to support the Ukraine in the present conflict - and got friends across Europe to freeze-frame 'infected' videos to look for it - the results were different from country to country as to whether it was there or not and some other parameters (I don't recall them all precisely now). I also found a subliminal message telling people to vote for the Labour Party, years ago, in one of their seemingly innocent political brpadcasts - again it was almost certainly illegal. Whether it's a criminal offence or not I don't know, but having wasted my time reporting clear political fraud in the UK before, with police and electoral officers just not giving a toss, I just didn't bother to report it, sickening though it was.
@@78tag Yeah, that happened to me having a private conversation in my home with a friend. He was due to receive a lump sum of money and jokingly said he would buy a pre-paid funeral plan with it. Later on when I went on my phone, the ads I was getting were for companies that sell pre-paid funerals.
Nothing is private anymore. Especially when you're dealing with the internet. Thank you for sharing.
the point is to take control again.
Big Brother is watching...and he's NOT your 'brother'. Great video Liron 🙂
He's that 1 big brother that in public defends his lil brothers from other bullies but behind closed doors, beats up his lil brothers that are too scared to tell the neighbors.
You mean it’s like family to criminal group… like a “brother” to a yakuza or a “father” to the mafia. Or uncle to the USA.
Google does not make their money from selling expensive products, they're also not making billions from advertising. Your data is the product.
@@jayn1848 We are the product.
Bunch of scumbags charge us for the privilege.
@@jayn1848 we are the end product.
@@not-normal771 it's in their talmud and torah...check it out!
Not making billions from advertising? I doubt that, considering the sheer number of sponsored links in their search and alsp google ads
Thank you, Liron.
Pocket stalkers are awful. Digital stalking ought to be as legal as personal stalking.
My stepfather had a Jitterbug flip phone. He switched carriers and they wouldn't use it, so it was shoved in a box for several years without being able to connect to a cell network. I found it because I kept hearing this weird noise - which turned out to be the LOW BATTERY sound. It still had several percent battery life after YEARS.
All the time it was in the box the microphone could pick up sounds, voices go easily through a card board box, all the time the microphone has been busy with collecting data, how many people there are in the house and at what time they are up or asleep. So now and then it connects to a network to send in a report. Then it switches itself off again, waiting to send a report next month.
@@vanhetgoor If the battery lasted several years, then I promise you that the microphone was NOT active.
@@larryboyd1872 Not all microphones need a battery to operate. Once I won a cheap watch on a county fair, in less than a year the battery was empty and the display stopped. A new battery would cost me ten times as mutch as the value of the complete watch. I stored the watch in a drawer somewhere. But many many years later, every time on a certain date the alarm would go off and it beeped. Sometimes an old battery is not completely dead.
I'm a young computer programmer, yet I prefer the Jitterbug UI over stock Android, despite it being designed for the technologically challenged old folks. It's straight to the point and requires few clicks to do things.
@@vanhetgoor not with a flip phone.
Damn, looking at this stuff, I think its best to go back to the early 90s.
No. It's best to install GrapheneOS. It's actually doable, unlike time-traveling. lol
Already being worked on which is why it stays at home and I use an mp3 player and a digital watch for out door adventuring since I do most stuff on social media or on my email these companies are gonna learn the hard way.
I am experimenting with two solutions. The first is a dumb phone. It is a clone of an old Nokia (real Nokias are also available), and I don't even have a data plan for it. I pay less than $10/month for unlimited text and voice. However, nothing will keep your location from being tracked by the carrier, as they can triangulate your location off the towers. And the truth is that your SIM has its own processing power so who knows what it may be collecting and sharing. The second thing i am experimenting with is a FairPhone. It runs a de-googled version of Android and it has a lot of powerful privacy features. I really like it, but in the US it will only work on T-Mobile or one of their MVNOs. I am paying less than $30/month for unlimited voice, text, and data. However, another bonus is that it is user repairable with nothing more than a small screwdriver. In the U.S. it is sold by Murena, everywhere else it is sold by Fairphone or Murena.
In that zinc-plated, vacuum-tubed culture? 🖖
There are apps that block trackers...
It gets much worse. My old flip phone used to use 0 battery power even if turned off for several days, but new smartphones seem to use about three percent of battery power overnight whether they're turned on or off. It seems that turning off only stops It from responding to user input. I suspect it is listening, tracking and reporting on what I do even when it is turned off.
@@johnmoran1481 that's not a real test. The phone is going to spend a lot more energy restarting than sitting idle in the same time. It's not unusual that if you record the starting battery %, shut down, start, and record the % again when it's ready, the % will have decreased.
Even off, the devices around can detect it !
@@weevilsnitzyes but leave your phone off for a couple days and you’ll lose more that just that bit of start up juice. So it’s doing something. I went hunting with zero cell coverage so turned my phone off at 95%. When I turned it back on 5 days later it was under 80%. It’s an iPhone 15, that tells me it wasn’t really “off”.
Nobody turns their phone off. When you press the button on the side and the screen goes dark, you’re only putting it to sleep.
If you actually turned it off, then it will stop using power.
easy soilution - remove the SIM overnight...
You are only seeing the front end. There is a back end to every phone, you will never see. I tried to find the actual case (it's discussed here on YT someplace) but there was a court case where a man had an accident and he was charged with texting while driving (distracted driving, whatever they call it in that state.) The man swore under oath he was not texting. His phone showed no sign of texting at the time of the accident. To make a very, very long story shorter, the prosecutor subpoenaed the AT&T records which showed the phone DID text at that time. The defense lawyer put the AT&T engineer on the stand. He testified under oath that every phone actually has 2 or 3 cpus and at least 2 operating systems (if not 3) and that the user only sees one of these CPUs and one of the OS'es. The other 2 or 3 run in the background and he testified it was one of these other OS'es in the background was sending the texts not the man who owned the phone. The engineer was asked "Who did the phone send the texts to?" The AT&T engineer said under oath, "I can't tell you that." The lawyer and witness went back and forth until the engineer repeated the same answer several times and eventually the judge said to move on. I also have a friend who worked for AT&T and he's told me things that would send a chill down your spine.
Indeed so the chills down one's spine. No network equipment manufacturer is allowed to resell their equipment without the firmware and NOS being vetted by certain governmental agencies. The NOS must have a backdoor in it - albeit being un-anounced and denied by the supplier. Go figure how the NSA et al use this.
@@stickman-1 sounds like a low key testimony that it’s Government and / or the phone companies getting your information..(likely in cooperation with the government)
@@stickman-1 like what? I don't have a friend who has or does work for AT&T.
So please share
Always be on high alert when something was purposely misnamed from it's actual purpose. Especially when the "name" seems more trusting than the actual purpose.
For example, "app measurement" seems like like a neutral app to help your phone measure app data. But it's actual function is to track your private data.
The same goes for politicians. When the majority of them vote for a bill that is named something that is trusting, make sure it does exactly that and not the opposite or else.
Always remember that you are in control and everyone else benefits when they take that control away from you.
My knowledge filled comment just got scrubbed 18 seconds after posting it . Thanks google For telling me my hypothesis is correct .
@@peachsncream5808 mind repeating the gist of it?
mind repeating the gist of it?
@@binsarm9026 I have
To respond , any more than a few words Is being removed 🤦🏻♀️
Yeah, my comments and replies always disappear too.
Mahalo for a REAL eye-opener episode. You've made me even more relieved that I no longer carry a phone around anymore. Look at what I'm missing.
@jimcabezola3051 Just curious . . . What device did you watch this video on?
I've never carried my phone around very much. The main reasons are it's a pain in the rear (don't lose it, drop it, or accidentally leave it somewhere. I also don't want all the interruptions of my time by notifications, calls, & texts which can become 'like a ball & chain.' The other reason is we KNOW that EMF is NOT harmless whether it's ionizing or non-ionizing.
If my phone is in my purse and I'm driving somewhere, it's only in case I MIGHT need it or want it. If there's a long line at the bank or grocery store, I'm glad to have it to pass the time more quickly. More often, I forget it's there.
At home, I spend most of my time outside. I don't take my phone with me to mow the lawn or clean the pool, etc.
It can remain off for several days at a time, usually until I figure I should probably check for msgs.
Meanwhile, I have 3 tablets that are NOT synced to my phone & those are the devices I use the watch YT, Google something, play music or games, email, etc.
Sure, "they' can capture my on-line activity, what times I'm on or not on, but my location is gonna be pretty boring. My tablets rarely go anywhere, and when my phone is with me, it's usually off.
Curious to hear your logic, etc.
It's sad that we have gotten to a place that this is acceptable and few seem to care and little is being done about it. Also on your next test see if after you "uninstall ???" the app such as TikTok does it still keep stealing your data.
I use a degoogled phone [uses android open source project instead, which has no android apps in it] and don't have any apps on it that can compromise me to corporations unknown. No tiktok, amazon, etc.
I've been trying to convince people about the dangers of their phones and I've never had one who appeared to be interested in remedying the problem. people think about Security and assume that Privacy is the same thing. Many 'experts' on line don't seem to know the difference either.
Have you checked with Pi Hole or some other utility what DNS requests the phone is making?
@@robertsandy3794 Pihole and similar DNS solutions are not really suited to monitor such kinds of traffic. There are connections from hard-coded IPs (hard coded in the OS itself) that don't even show up, because there are no DNS requests. To fully grasp the situation, you would need to monitor the traffic with something like Wireshark.
Make sure gaps is removed.
GrapheneOS. Saving up to get one.
Normal people wont trade convenience for "security-holes", unless they have been in those "holes" themselves. People compromise easily when they dont see the immediate risks, let alone if they dont understand its working and effects. Education down to the basic is the only way, but not everyone will be willing to learn. We win some, we lose some. Saves what you can, but know when to let go.
I have a tracker detector and blocker running in my phone. Google is in Everything! To be an Android app producer, you must allow this. Facebook allows sometimes a dozen trackers at one time. They dont even directly handle the data they scape. Your phone is 24/7 surveilance.
There is a Browser called "Brave". It seems to block most of the tracking.
Some awesome questions here! I am working on a follow-up video to answer your questions so keep them coming!
Reckon it's possible to do a similar test with a iPhone ? A teenage girl with an iPhone and the results would be super scary 😆
Tracker Control and Warden are 2 apps that can check for spyware, well, most apps have them. But try those apps out, can help you block ads as well!
It can give you a lot of information as well.
- Darkijah
Tracker Control can also block internet for an app totally, if you push the icon, it becomes greyed out.
The "bursts" include GEOLOC data - this is the infamous (We know where you are at any given moment) part of this tech...
Are you South African?
Time to put the phone in a Faraday cage. LOL
It can still communicate with other devices with sound. Ultrasonic frequencies.
As a Technician, I understand that the cell phone might seem like a concern, but honestly, it's the least of our worries, especially if you’re relying on off-grid solutions. Just think about vehicles-they can be so intrusive, and then there are the Flock Cameras... I could go on! Even the convenience of food delivery services like Uber Eats adds to the mix. Sometimes, it feels like we long for simpler times, perhaps even a return to using pigeons to send messages! 😂🕊 0:50
There are a number of phones running OS's that supposedly focus on privacy. It would be interesting to repeat the same tests on one of these.
They do the exact same, with some additional metadata being sent back to the fruit company. I have pihole, and have confirmed it myself.
I've been using a sell phone for years. Lately, people like you have made me more aware of the dangers of using cell phones and the Internet. The information you supply is very technical, and I'm not that technically savy. I'm tired of all the steps I have to do to keep myself protected. I'm also tired of all the ads and cons. For those reasons and the wasted time being on the phone and Internet, I'm dropping my phone service and access to the internet and the internet access to me. I'm done. I'm going back to a land line.
Great video! Don't forget that DNS is very often used to send data "home" as opposed to looking up an IPv4/IPv6 address. Although originally just a technique for "bad actors" to exfiltrate data, it's now used by "legitimate" companies too. It would be interesting to see if any of the lookups contained long hex strings in the queries that were bursting.
Bursts: most apps can't remain active due to recent Google services limitations. Thus, they use Google services to activate their service and thus have to do their job when Google allows them. As far as I recall, they have 90 seconds before getting disabled again.
It would be interesting what apps are blocked on this same phone after installing the Duck Duck Go web browser and turning on the background blocking tracking feature.
@@Skiddy1963 Eye opener about Duck Duck Go: In particular, it doesn't encrypt search terms in the URL bar. Also, your data can be monitored if you share it on third-party websites or through online forms.
Really enjoyed that video. As you alluded to that not all websites are showing the tracking behaviour because they are employing other methods to extract that precious data from your device.
This is no surprise for Android phones. Would you be able to do the same test for iPhones?
so far, yes but am still checking
Depends upon which version of iPhone, and even the iPhone size and other items.
Note that when they came out with items such as the iPhone 16 pro max, that they also essentially discontinued most of the iPhone 15 line? iPhone 16 includes items which *they claim* make it more secure in case of loss or theft. Some of these items are not ever available to be bypassed or turned off. For most any iPhone, also consider it is always being tracked by the carrier, always sending out IMSI, always looking for WiFi and Bluetooth, especially low power Bluetooth.
It still collects data and sends to the same places
@@ClausWawrzinek Apple tracks you.
Apple is even worse than Google.
Hey Liron, what an interesting video! Watched till the end :) I would really like to see you make the same video but with an iPhone just out of curiosity :D. But this video and many of your videos in general have opened my eyes!
Noted! And thanks for watching!
I can tell you they do pretty much the same thing. I noticed all the domains my phone reached out to and blocked them on my home network. I don't do social media but for some reason my phone calls out to Meta, TikTok, and Snapchat. I don't have anything to do with any of them.
It's like living in the Truman Show times two with A bunch of Corps bidding on your energy.
Very interesting video, and thanks.
Please make similar video for a De-Googled phone.
Can you do the same test with for example the Whatsapp app and Signal app? I'm curious to know what these apps do.
If so, then he should do the test with a wireshark in between and not these children's games with Pihole.
I'd like to know what phones are doing when they're supposedly powered off.
@@dwaynenewton1 what's the phone doing when off you ask?
It's doing the same as a guy wearing hat and sunglasses while pretending to sleep in same room as you, listening and watching your every move.
Can you say :"hello big brother" ?
Seeing the data on this would be very interesting
Technically speaking they are off. The OS is not running. If you leave it off for 2 months your power level will be near the same. That said the sim uses a very low quiccent (micro) current level
But some secure facilities require you to deposit your phone into a copper mesh faraday cage in case it was compromised or you are an agent.
RFID tags are powered externally through EMF
@@donh8833 I have a phone that dies within a week when powered off. Sent it for warranty service and it doesn't hold a charge.
They only ping towers for tracking says Snowden and my battery dying while off
TikTok had all those domains built in. I wonder how many are changed/added every time the app is updated?
Privacy is a myth since 2001, even worse, we are training AI for big tech companies and everything for free
I think that you already had a question about IPhones and if they have the same issue. Looking forward to your next video on if this applies to IPhones and how to stop this activity. Love the videos.😊
Yup. Am on it
What would happen if apps were disabled?
no traffic was reported if an app was disabled or removed.
@@LironSegevbut how come apple keeps using data for "uninstalled apps"?
@@aliceg1212That's only a track record for how much TOTAL data was sent over internet. Also, iOS behaves differently and will have a very different domain list
So, how do we stop this?
@@Redwan777 but you can empty that counter... and when it starts again it keeps counting data for uninstalled apps... 🤷🏻♀️
TBH, this is the reason I have gone back to an old flip-phone. I'm just done with all the tracking, all the listening, all the meta data acquisition.
Seriously. I'm about to just get rid of my phone altogether.
there is a lot we don't get to see...now imagine what is happening with all our cars where get to see even less?!?!
I have looking at old phone .
@@LironSegevcomputers central including CONTROL of your car! 🤔🧐🤨
buy a blockchain or Rob Braxman phone
@@cheery-hexI don't see how purchasing one of these would assist. They all still will make DNS requests.
The real question would be once the phone is not at home, what facility will allow us to blacklist these DNS requests without rooting our phones
Sir,
Very informative video. Government should restrict these companies to steal data of people without their permission but these companies are paying millions of dollars to government, therefore, no such restrictions. Ultimately people are paying the price.
Saar government doing nothing saaar. They taking million dollars saaar
Well you read and accepted the terms of service and privacy policy, didn’t you?
@@nickplays2022 Definitely, but isn't it a blackmail that in leau of technology companies are compelling people to accept their terms and conditions. Secondly, if people have more options who will accept to compromise with their data. Yes, government has capabilities to restrain these companies but as mentioned the reason it is silent.
@@nickplays2022 I'm dyslexic, I only know I need to push the Yes button for it to work ... /s
Good news - I tested the iPhone! New video coming soon🔥
@@LironSegev hi, pl test app named veryfit.......thx
stick a firewall in between your router and modem, and record at least the packet size, amount of data being sent. If you have the means, you can decrypt the SSL and see what is leaving.. but this tends to be expensive gear.
This is something I always wanted to try doing. Very interesting finds, this is one reason I largely dont download apps and just use my mobile browser when possible.
I didn't fully scroll through all of the comments to see if this had been asked yet, but it seems pretty worthwhile to get an answer. What lists did you configure pie hole with and how can we get them?
Keep up the good work mate form melbourne
An absolute eye opener for sure. If our devices are Dopamine farms, does that make developers the Dopamine farmers? Lol
Appreciate the video, gained some good insight here as always.
Yes it does!
Interesting, but somewhat flawed experiment.
1. A DNS lookup means a connection is being made, but it does not mean any data will be sent. In fact, certain applications create all their connections when starting up. Practically, you don't know what data is being collected and tracked.
2. Of course there will be multiple connections to Amazon subdomains, for different services and APIs. It can all happen at once because the application just creates connections at startup.
3. When you are not logged in, it still is very likely that connections are being made on startup anyway and is not necessarily a sign of tracking. I am sure there might be tracking, but not to the extent you are alleging.
4. Not all API calls are for tracking.
5. For Firebase, some "tracking" is to know what parts of the app you are using, e.g. if you used a certain feature or not and how frequently. This info, in anonymized aggregate, is useful to app builders to improve their apps.
Excellent work!
I wonder if the devices save the info and send it back while not connected to the Internet.
Also what are all the mystery folders with no items inside doing on my device?
Oh my! This explains why the government UK are not pushing identity cards - not needed.
Great information its time to not have a phone on or even batter connected and maybe wrapped in tinfoil...
Very interesting! Thanks Liron!! 👍
My pleasure!
Great information. Keep up the work.
I can only say a little clip from a Pink Panther movie,
Man one askes man two, " Does your dog bite"?
Man two say "no"
Man one goes to pet dog, dog snaps a bite at him
Mane one " I thought said your dog doesn't bite?
Man two It's not my dog.😜
Same with "my" phone.😁
Would be interesting to see again after you have "deleted" the said APPS !!!
once the apps are uninstalled there was no more connections from those apps
Those apps might stop but the phone still has services that send data. Mine was sending tons of data to Chinese servers, because that's where it was made. This might depend on the manufacturer, of course.
The fascinating thing I found is that my cell phone, whose expired SIM card is from another continent and has not had service for years...
still has full GPS capability. Meaning if I open up Google maps it will show me exactly where I am. And this feature even worked when I was lost in the mountains of Bulgaria.
GPS is receiving only.
@@turtlefrog369 ok, maybe I don't know much, but doesn't the tower have to SEND the location for my phone to know where it is? So the tower knows where the phone is 24/7... even though I have no service and the card isn't compatible with any local network.
@@rageonyx GPS is completely separate from SIM card, takie off your tinfoil hat and read about GPS technology.
@@rageonyxGPS satellites constantly broadcast signals. A GPS device then can calculate the distance to the satellite.
So the device needs to receive GPS signals from at least three to four satellites, to be able to calculate its own position.
At no point does the device communicate with the satellite. Think of it like a TV satellite, where you also only can receive signal.
@@rageonyx cell towers are not GPS. although i am sure cell towers can act ike like GPS satelites maybe. There are different location services being used in phones. GPS, cellular and wifi. GPS is the most secure because its recieve only.
Wow Liron your analysis of the internet is very thorough! I want to learn this and you to be my internet analyst.
I'd be interested in knowing if there are still things being sent when the phone is turned off.
He was literally talking about that all the time. Do you have trouble understanding English?
@@Karel8X I meant completely powered down. On most you can't remove the battery anymore.
@@Troy_Built Would be complex. You would need to monitor the radio, wi-fi and blue tooth connection in it's full spectrum.
I think a more useful information would be to identify which apps are making those requests and not just which domain they are contacting. For example, if the amazon app tries connect to tiktok, you would blame tiktok although the request came from a different app. Knowing which app is making the request can let the user decide if the app is worth it. Just my thought. Nice video though. 👍
Hey Liron.
Wow, that is hectic!
I did see your VPN video about a month ago. What I do is keep Proton-free VPN on. On a reboot of the phone make sure is on
I almost set it and forgot it.
I do understand not everyone will, but it is a good habit to get into.
Take care.
Just remember to turn off the Proton VPN app before you update it. I keep forgetting and it gets stuck halfway.
@@gwaeron8630 That is true. I forgot to add that. At first, it stumped me. I was like, "Oh, disconnect the VPN." Thanks for the info.
I was shocked to see all my Smart TV'S had a hidden camera and microphone that was sending several gigabytes of data every morning at 3am. This doesn't surprise me at all
Super helpful video liron cheers 🤩
Glad to hear!
I'd be very interested to see you tell us if the Unplugged phone is really Unplugged?
I basically run my phone like an old Nokia. No banks, like 2 added apps. No location, bluetooth, wifi connected, no auto updates, no auto nothing, yet if I don't plug it into the charger at night, I lose 50% of battery, starting at 100%. If it starts at less than 100% and I forget to plug it into the charger, it uses up all he battery as I sleep, then turns itself off.
I have no idea what it's doing.
Cheap Samsung, tmobile, Samsung internet.
Modern phones use more battery than nokias, altrough dunno if it should eat up more than my laptop but then again, a laptop uses more processing power to run stuff than a phone.
Don't mind it too much.
Lithium Batteries deteriorate sharply after 2-3 years. If new battery, shorter than expected battery life is a sign of spyware.
Amazing video.... thank you!!!
Can apps bypass your DNS settings and connect to another one?
If you block all other dns in your dns then they don't.
Thank you for making this.
Thank you very much. 😮🙏
What can the arverage phone user due to reduce these privacy issues and still carry a phone?
Apple does it too
@@markosejic7383 Yes Indeed
Great content, just subbed. What about a more deep dive into this? As you mentioned, can you track the ip addresses the phone connects to via our router and see where it goes, can we block them on a network level, can we create a system on our phones that'll block the device being connected to those (without root), etc etc
Could you try with an iPhone? I am pretty sure it will be similar but I am curious. Thanks
good idea
I would suspect that there will be a difference with regard to the google connections as Android is basically a google phone….????
Phones are worse -- especially the 16.
@@Piano_Castle More discrete and hyped about it.
7:58 no need to input all of that domain, just block the api domain thats it.
Hi @LironSegev great video. I notice you used an Android device. But how do Apple devices behave?
working on that now
@@LironSegev I can't wait to see your findings
Very informative video. Question, if I uninstall the app is the phone still sending tracking and marketing requests out once they were installed and turned on? Do they get removed when the app does? A lot of times I may try out an app only to find out that know this is not really what I was looking for and uninstall it.
Liron is there an app that stops this "telemetry" aka sharing of information? With laptops there's spybot anti-beacon that does this but nothing for phones as of yet.....
AdGuard
Some VPN's have a trackers and ad blockers built in. I personally use NordVPN - geni.us/NordVPN-SFC (affiliate link but you do get a big discount and 3 extra months)
Try Quad Nine DNS
Question for future Vids: How much 'stuff' is left behind, still communicating, after you 'delete' an app you once installed? Also, I use Cricket wireless and they regularly try to get me to install some game or app. I can apparently decline them, but what might be getting put on there without my knowledge?
i would be curious to see this same experiment with an iOS iPhone - apple marketing makes the claim its privacy first
On it
Privacy and data gathering are different things. You might still have everything you're doing being watched, but maybe Apple is a little more cautious about releasing your data to outside companies.
@@mediocreman2 Very true, however it would be interesting to see the practices which Apple are using versus Android - given lots of people trust the security of Apple vs Android.
Apple talk big, but no privacy with junk security. Read the bug-fix logs and cry.
@@tailscape Misguided. Talking from experience.
Hi, thanks a lot for the very useful video! Could you please do the same with a Huawei phone which doesn't have google to see where it connects?
Thanks a lot!
If you knock on a door and there is no answer you tend to knock again.
Only a stalker or a salesman keeps knocking on a door that nobody answers
@@jbrock8596 🤣 👍
Please go into further detail on the different type queries, such as A, AAAA, and HTTPS. What are they doing? And type look-ups, such as CNAME and IP. What's the difference?
I too have been using Pi-hole for years. What's even scarier is watch the queries increase once you plug the phone in overnight. Once you begin blocking certain things, it irritates the device and software into frantically pinging those IP Addresses all night. It's like the device knows it's connected to the Internet, but can't achieve it's goal.
Do iPhones also allow tracking?
@@alb-bos yes
It would be fantastic, if You wuld do the same test with Graphene OS for comparison!
I think I miss my landline . . . .
Also cheaper solution: If you're the only one in your PC who is upset with different staff, you may use "hosts" file or sinkhole it on router if some more ppl or devices would want to benefit.
The connection itself doesn't mean there's any actual data leaving your phone. You are listing DNS requests and not actual communication, so all of this is BS.
It ok if you didn't understand. The entire point wasn't the data, you need Wireshark to see that. The point was the simple questions: why do so many connections get made? Why are so many of them to ad and tracking systems?
It's to make people aware of what their phone is constantly doing.
Most people understood this, so this is a you problem.
Now feel free to piss right off.
K bye
@@LironSegev It was the guy from google :)
Agree, the connection itself doesn't mean there's any actual data leaving your phone.👍
It's to tell the company server that the data on this phone is ready to be stolen in the next days, weeks or months.😂
thank you sir. would love to see more related content on this. Love and appreciate your work.
Noted
Scary like 1984.
I use LineageOS and no google apps, social media, or shopping apps are installed.
Hi. What phone model do you have? Looking for low cost long term linux phone.
@@JoeSmith-pu9hi I am using a Galaxy S5 for everyday. I also have a Galaxy S3 with LineageOS for use as a Walkman music player. You could try a program called Android de-bloater to strip your phone of useless bloat
But you just stated no social media?
RUclips is literallly connected with almost every other form of social media, and also linked back to your entire identity.
@@ronaldckrausejr7762 Like I said earlier no social media on my phone. This site is accessed thru my computer and only my computer for comments.
Does, Duck Duck Go use the same technology? I use that, and it blocks a lot of tracking by FB, Google, ect.?
Time to start uninstalling apps.
Most of the time its better to just use your web browser.
Or not install those apps in the first place
You can't uninstall the OS.
I demand a percentage of Google making money off my data. Umm, 25% . Now. I’ll await the check.
Well, as someone who was born with the paranoid gene fully enabled, this doesn't really surprise me. I do share your bewilderment as to why so many in such a short amount of time. And this kind of activity is why when you travel, be sure to find out ahead of time what the roaming charges might be, as some countries have very high charges and one might think well I didn't use my phone for anything, so why do I have a $6,000 cell phone charge? If you do travel to such a country, keep your phone in airplane mode at ALL times unless you are using a wi-fi connection.
Thank you for the info.
Looking forward to the next video, hope this is the first of a series
Going to try and see what iPhone does and trying to get other non DNS data too (much harder without rooting a phone which I am not keen on doing but well see)
I realised, that in some case, especially belongs to Google, your phone is listening to the environment too and transfers it to Google. This was when I was near people who talked in ukrainian language - when I then searched for a place, Google maps were written in ukrainian language. Other time, when I was near people, who talked turkish, Google maps went turkish. By the way, PI-Hole seems to be used for MITM attacks...
Apples is just more exclusive about it. All in all it is one big gang and interchange.
Thanks for this information. I’m curious; if an app has been added then deleted can it still operate in the ‘background’ or is it truly ‘deleted’?
Phones being by nature a social networking device I believe will always have the problem of unwanted analytics creeping in. I would never consider a phone a safe device for any kind of storage for important information. Edit: Malicious actors will always be seeking to abuse these loop holes.
Phones been tapped since their invention, but never on this industrial scale or these type of actors.
Is it moral to sell someone a security camera and then intercept the data to watch what happens in his house?
You do realize there are satellites above you and your house. Cameras with license plate readers all over the roads.
Which one are you more concerned about: Big Brother or any random app developer somewhere in the world who adds code to an app on your phone?
@LironSegev You answered the question already. I know someone who liasoned for a major software company with the Pentagon. He said that camera technology is way better and more prevalent than any Hollywood drama writer could imagine.
The more complex and pervasive a system is, though, the more holes it has If you take it for granted thst you are being watched all the time, circumvention becomes trivial. The arrogance of the powers that believe they are in control is a great weakness. The more data they collect, the greater the noise to signal ratio there is.
Most of their tools are for gauging how well they are steering the masses rather than surveillance of individuals in any case.
@ThePhoenixcompanies yup, I pretty much assume I'm being watched and/or listen to pretty much anywhere I go. Like even if I left my phone at home to "not get watched/tracked", I would still be watched/tracked all day. Like the number of people that have smart doorbells/other exterior cameras on home. Plus all store/factory exterior cameras. Plus any bus/other vehicles with cameras. Then of course, work with all interior cameras and punching in. And all stores I might stop at and use a card at. So it's a challenge to not get watched/tracked. I'm sure it's easier to do with more knowledge
“My internet is running slow. I only have my phones connected to my internet!”
Maybe it’s the phone.
Big brother is watching us
less concerned about Big Brother, more concerned about app developers...
Hahaha well, might as well take it out and give'em a show then.
What make and model phone you used, and what version of Android, updated or not.
Google is too comfortable
I am not worried about Google as much as people cry about them, I am more concerned about apps that can be written by large teams and can do basically anything as long as they pass the Play Store's checks...that should be a FAR bigger concern
Is there any eay how to block all this sites and trackers? Just for priciple of my freedom and rights.