Hello guys. I recently acquired a Pixel 8A and it was Google stock os I bought it from a man locally all with cash I brought It home and I flashed grapheneos onto this phone.

What else needs to be done to anonymous this phone and make it a privacy phone and a spy free phone no tracking phone no interception phone and no monitored phone.

Any advice welcome!

Thanks.

  • @Koolaid33@lemm.eeOP
    link
    fedilink
    06 months ago

    I have already inserted a sim card into this phone. The sim card is a kyc sim card. I want to do best I can without compromising my identity. My threat model does involve government interception and tracing, but it’s more about staying Safe with this phone whilst I’m possibly under surveillance. Local police entities. More so than government contractors / third parties. What is best VPN to use in this phone? I rely in the sim card in this phone so always keeping in aeroplane mode isn’t possible as this is my primary number and I need to have constant connection to it. In this case, what shall I do with this phone?

    • @jet@hackertalks.com
      link
      fedilink
      English
      8
      edit-2
      6 months ago

      https://www.privacyguides.org/en/vpn/

      Privacy guides is a great place to start. They have lots of advice on many things for your digital life.

      Running graphene OS is great. Just be deliberate about what apps you run. Use an encrypted messenger such as signal, or simple x, for your secure phone calls and messaging.

      Even if you used a SIM card, that you paid for in cash, with no KYC. You’re still not anonymous. If you use your SIM card at your house, the network operator will know that, and over a period of time will know where you live. Only so many people live there. They’ll know where you travel, they’ll know where you spend time, they’ll know when you make phone calls, and who you make phone calls too. That’s just the cost of being attached to the network

      So when people are telling you if the network is your threat, don’t attach to the network, they’re not being unreasonable. It just requires you to be clear about what your threats are