Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:00
In regard to privacy and security, I believe
0:02
our mobile devices are the most
0:04
important things in our digital lives
0:06
which we need to protect. They are
0:08
the most likely to be lost or
0:10
stolen, but I try to look at a bigger
0:12
picture. Every mobile
0:14
device is a tracking device.
0:17
It's a tracking device which we purchase
0:20
with our own money and then we carry it
0:22
around everywhere and then we
0:24
pay for monthly service in order
0:26
to connect to a cellular network and then
0:28
we allow that cellular network to
0:31
constantly document our location
0:33
and document all of the activities
0:36
and communications which we use on their
0:38
network. If that weren't bad enough, we
0:40
then allow Google or Apple
0:42
or whatever you use to then
0:44
collect all the data that they
0:46
can see, which they can tie
0:48
to our profiles. We pay a lot
0:51
of money to all these different services
0:53
but then allow them to
0:55
profit off of our usage of
0:57
their networks, devices, and digital
0:59
products All of this data which we
1:02
volunteer to them can then be used
1:04
against us. We've heard about
1:06
geo fence warrants where you can get
1:08
caught up into a Dragonet involving
1:10
a crime, which you had nothing to do with.
1:12
We have subpoenas, even civil
1:14
subpoenas, which can immediately uncover
1:16
all the different things you do on your devices include
1:19
that in part of some type of civil litigation.
1:21
There's the occasional bad employee at
1:24
any of these services, which
1:26
will abuse their power to collect our data
1:28
and give it to people who don't need it. And of course,
1:30
we have the inevitable breach or
1:32
leak or whatever, That's going
1:34
to expose everything we've done anyway. Why
1:37
do we allow all these companies
1:40
to collect all that data, use it
1:42
to their benefit, and then send us the
1:44
bill. We have the ability to
1:46
make our mobile devices not only
1:48
secure but also private. Most
1:50
of us just don't do anything about
1:52
it. We can prevent most
1:54
leakage of this information, which
1:56
could be used against us in the future.
1:59
It just takes more effort. Google,
2:02
Apple, all these things are very convenient,
2:04
but they are also very invasive.
2:07
Today's show is all about mobile devices.
2:09
Mobile device privacy and security. What
2:12
what we can and what we can't do to
2:14
take ourselves out of this system of
2:16
tracking everything we do. We're
2:18
going to talk about many steps which
2:20
you can take today to eliminate many
2:23
of the headaches you will have in
2:25
the future. Let's start over
2:27
and let's secure our mobile devices
2:30
together. You
2:38
are listening to the Privacy Security OSINT show
2:40
episode 290 released on
2:42
February twentieth of twenty twenty
2:44
two. In this episode, I release our first
2:47
digital guide as part of our new Extreme
2:49
Privacy Series to vote the bulk
2:51
of the show to mobile device privacy and
2:53
security and offer some OSINT updates.
2:56
Direct support for this podcast comes from
2:58
our services training and my
3:00
new books for twenty twenty three OSINT
3:02
techniques, tenth edition, and extreme
3:04
privacy, mobile devices, digital
3:07
edition, more details can be found at inteltechniques
3:10
dot com or within these show notes.
3:13
Welcome back everyone. This is an odd show
3:15
because I'm releasing it on a Monday. Typically,
3:17
I release my shows on Fridays, but something
3:19
has come up. And starting in about four
3:21
hours, I am going to be off radar for an
3:23
unknown amount of time, so I wanted to get
3:25
this out sooner rather than later,
3:28
so here it is. Before we get into
3:30
the main topic, let's go through some OSINT
3:32
stuff because I do have several ossent updates,
3:34
which I think are quite important. For
3:37
people using the latest
3:39
tenth edition of the OSINT Technik's book
3:41
and you have a Mac computer
3:44
with an m one or an m two Apple
3:46
processor in it, you may have
3:48
noticed a problem recently with
3:50
the latest edition of Ubuntu. Obanto
3:54
in the book when I was making that book was
3:56
version twenty two dot o four dot o
3:58
one LTS for long term support.
4:01
And it works fine. There's no issues there.
4:03
Several people have contacted
4:05
me to say that the latest version
4:07
of Ubuntu OSINT two dot o four dot
4:10
o two LTS is causing them
4:12
issues. What people are reporting
4:14
is that specific recent
4:16
version of Ubuntu on a Mac
4:19
machine with an m one or an m two processor using
4:21
UTM as virtual machine software doesn't
4:24
boot. It just gives them a black screen.
4:26
This only applies to people who are,
4:29
a, making a new a Ubuntu virtual
4:31
machine. B, they're using a
4:33
Mac computer c, you
4:35
have the m one or m two processor and
4:38
d, you are using UTM, which by the
4:40
way are all great things. I recommend that. If
4:42
you are having this problem where you get the black screen
4:45
while installing Ubuntu, just go back to version
4:47
twenty two dot o four dot 01I
4:49
will put a direct download link in
4:51
the notes, which will download that specific ISO.
4:54
But again, that only applies to
4:56
people under those circumstances. Everyone else,
4:58
this probably means nothing. Next, numerous
5:00
people reporting that what's my name is not
5:02
working within the Ubuntu
5:04
build, and I was able to replicate this and
5:06
confirm this. This is something that seems
5:08
to be happening more often with
5:10
that application. When I was writing
5:13
the tenth edition of the OSINT book,
5:15
I had used what's my name in the ninth
5:17
edition, but I was having difficulty with
5:19
it with the tenth edition as well, which is
5:21
why I tried to introduce better
5:24
alternatives to that And
5:26
I think now that it's not working, we need
5:28
to really embrace those other options. My
5:30
preferred username Linux
5:33
lookup tool right now is Meg gray.
5:35
That is MAIGRET.
5:38
It is a fork of Sherlock which
5:40
is a staple which has been around for a long time, but
5:42
it adds numerous additional sites.
5:45
If you are using the tenth edition of the book and
5:47
you have the LinuxVM made,
5:50
you already have a username script and in
5:52
that script is May grey and it already
5:54
is configured to query all
5:56
twenty eight hundred sites that it
5:58
can query looking for a target
6:00
username on those websites. None
6:02
of those username search tools are perfect.
6:05
They all give you false positives. I
6:07
typically may gray can be a little
6:09
bit better, but if you're noticing that what's my
6:11
name just doesn't work anymore, it's it's it's
6:13
not just you, it's not just the script. It's
6:16
the the program itself. And
6:18
again, I'm recommending May Grey as an alternative
6:21
for that. Next, I added
6:23
a new option in the domain names
6:25
search tool on intel techniques dot com.
6:28
I added webscout, and that's webscout.
6:31
Io. It's a domain lookup
6:33
tool and it it's a very pretty
6:35
tool. It doesn't do a whole lot, but one thing
6:37
it does has helped me recently.
6:40
When you put in a target domain name,
6:42
it tries to conduct a query through a third
6:44
party API for any email addresses
6:47
involved in a breach at that domain.
6:49
Now that's never going to be complete, not
6:51
even close to complete, but what
6:54
it helped me do the other day was put
6:56
in a domain name and identify the
6:58
CEO's email address, which was not
7:00
a standard format like first name dot last name
7:03
or first initial last name It was something
7:05
a bit unique because the CEO probably
7:07
doesn't want a bunch of email. That helped me
7:09
identify the proper email to contact
7:11
the CEO of a company because That
7:14
person's email appeared in some data breach
7:16
and now this third party service was the only
7:18
domain research tool which presented
7:20
me an email address of my target.
7:23
So I'm adding it to the domain name tools.
7:25
You can go get that under the tools tab
7:27
over to inteltechniques dot com. Click on domains.
7:29
And you can use that or you can also do it
7:32
manually if you want to do a search on
7:34
that site. Again, not
7:36
anything too groundbreaking there,
7:39
but it was the only service which gave
7:41
me that one piece of information which I
7:43
needed and so we should always have
7:45
those. That domain tool is getting
7:47
quite long. But there's some good
7:49
stuff in it. Alright. Let's get into the main topic
7:51
of the show, which is mobile devices. This is
7:53
a show I've been teasing for a few weeks
7:55
now. And I'm going to
7:57
do my best to not
7:59
make this sound like an NPR
8:02
fundraiser show. Yes, I'm going
8:04
to promote the PDF we just released,
8:06
but I'm also going to give out a lot of
8:08
information from that PDF, which I think could
8:10
be helpful to people who are trying to
8:12
create a secure and private mobile
8:14
device. Let's recap just a little
8:17
bit. On the last show, I
8:19
stated that we would be releasing the mobile
8:21
devices PDF during
8:23
this show, which we are doing right now. I
8:25
stated that we had decided that we
8:27
would not be releasing a fifth
8:30
edition of Extreme Privacy this
8:33
year, and that brought up several conversations
8:35
of a, what's
8:37
the one thing that we would really drastically
8:40
change if we were writing a new book? And
8:42
b, what's the one service
8:44
we offer which people request
8:46
more than anything else, but then they either can't
8:48
afford it or don't come back to hire us
8:50
for that service. And that The
8:53
answer to both, by far is mobile
8:55
devices. There's a lot that's changed
8:57
since we wrote the fourth edition 290Extreme
8:59
privacy in regard to mobile devices, and
9:02
we hear from people every single day. Numerous
9:04
people every day saying, I need
9:06
help with a secure mobile device.
9:09
Most of them don't know that they want Android
9:11
or iPhone. They don't know that they need
9:13
a custom operating system. They don't have the details.
9:16
They just know that they need it
9:18
because either they have a problem or
9:20
they are realizing just how much of
9:22
their life they are giving up by using
9:25
these standard stock devices which we all
9:27
have been trained to use. So
9:29
that's why we got here. We decided,
9:31
well, we're not going to do another version
9:33
290Extreme Privacy as far as the fifth edition
9:36
this year. So we wanna do something what
9:38
if we tried to create a
9:40
smaller book, a more focused, a more
9:42
detailed book on one single topic,
9:44
which we could really dive deep
9:47
into, not worry about page limitations,
9:49
not worry about fitting it all into one chapter.
9:51
How do we do that and provide
9:53
it in an affordable way, in a
9:55
way that everyone can access it, and that's how
9:58
we decided, let's try a digital
10:00
edition. And that's what we've done. We have created
10:02
a single PDF file. It is
10:04
hundred and thirty five pages at eight and a half by eleven
10:07
full size paper and it has
10:09
sixteen CHAP which goes into
10:12
every facet, every
10:14
way that we build custom
10:16
devices for our clients. By putting
10:19
out a digital version, we really didn't
10:21
have to worry about any limitations. File
10:23
size doesn't matter. Page count doesn't
10:25
matter. We can go as deep into this as we
10:27
want and not have to worry about cutting
10:30
anything to make the
10:32
final book that we wanna make. So this is what we've
10:34
done. It is out right now. I will put
10:36
link in the show notes. We'll talk about it a lot
10:38
throughout this episode, but I want people
10:40
to know that it is available. The biggest
10:42
question, of course, is how much is it?
10:45
Fifteen bucks, and that purchase
10:47
also gets you updates. And that's, I
10:50
think, the big deal here. As I said last week,
10:52
this is not a buy it and we'll
10:54
talk to you next year and sell you something new.
10:56
It's a buy at once and anything we need
10:58
to change, anything we need to update, anything we need
11:00
to add, anything we need to remove, we can
11:02
do that and then just send out an email
11:04
blast to say, hey, new edition out.
11:06
Here's what's changed. If you want that, go get it.
11:09
This way, once you're in, you have
11:11
those updates without needing to buy
11:13
anything in the future. We actually released
11:15
this last week, but we did a
11:17
kind of a quiet release. I announced it on my blog
11:20
which a lot of people do follow because the podcast
11:22
is also fed to the blog, and
11:24
sales have been strong. I'm I'm
11:26
very happy with that. What I'm
11:28
more thrilled with though is
11:32
the names and the email addresses
11:34
being provided by the people buying
11:36
this extreme privacy book, easily,
11:39
at least ninety percent
11:41
of the sales are using either
11:43
masked or some type of
11:46
privacy related email addresses. I'm
11:48
seeing very few people use their true
11:51
email addresses that Gmail or that corporate
11:53
account and those who are doing that probably
11:55
aren't only doing that because they have to in order to get
11:57
reimbursed by their employer or something like that.
11:59
So I'm thrilled to
12:01
just see so many people using
12:04
alias or at least masked
12:06
information even from me that
12:08
that makes me so happy. It's also fun
12:10
to see the names. We we have to
12:12
ask for a name and email address and credit
12:15
card information because that's what our distributor requires
12:17
us to do. I don't care what name you put on there
12:19
as long as this charge through. doesn't matter to me.
12:21
I don't care what email address you provide as long
12:23
as it's a way to get a hold of you so that you can get
12:25
the updates. I don't even know your true
12:27
corporate or personal email address it's
12:29
great to see people using alias information.
12:32
The number one purchaser used
12:34
so far is John Doe followed by
12:36
my name, which just kind of creepy to see
12:38
come in. So kudos to all the people who are
12:40
taking their privacy seriously and
12:42
using that type of information. Several people
12:45
are already asking, will the current print books
12:47
on Amazon and the answer is yes. The tenth
12:49
edition of OSINT techniques and the fourth
12:51
edition 290Extreme They're still out there.
12:53
They're not going anywhere. We're just not doing anything else
12:55
with them. In an ideal world,
12:58
this will allow us to leave the Amazon
13:00
ecosystem and possibly move to this
13:02
new format for all future stuff.
13:05
The fifteen dollar charge for
13:07
the ebook covers everything
13:09
including the distribution, the credit card fees, etcetera.
13:11
And none of that goes to Amazon,
13:14
none of it requires any type of account to
13:16
be created. We are using our own
13:18
Stripe account for the purchases, so
13:20
your credit card information is only going straight
13:22
to Stripe. We don't even store that and
13:24
we cannot see your credit card details. You
13:27
can find many more details about this on my website
13:29
inteltechniques dot com, click on the books tab, scroll
13:31
to the bottom, you'll see the new option there.
13:33
And then the question comes, well, what's
13:36
next? We introduced this idea
13:38
of, could we do a series
13:41
of books on extreme privacy, digital
13:44
only, more affordable, and more
13:46
in-depth. I think that's a really good possibility.
13:48
We have to see how this goes first. I
13:50
wanted to do a book on our
13:52
brand new second
13:55
passport option, which is
13:57
a fast track option we've worked
13:59
out, which also includes an
14:02
optional foreign name change,
14:04
which does not reflect a US
14:06
name change, but my staff
14:08
says that would be such a
14:10
small niche community of people
14:12
who would be interested in that. And that might be
14:14
a waste of our resources. So we are probably
14:16
not going to do that. What my staff
14:19
brought up is if this works
14:21
out and if it's the new way we want to
14:23
do this. Let's start with ebooks on each
14:25
service we provide. So for example, the next two
14:27
ebooks could be the disappearance
14:30
kit or the dev kit. Let's walk
14:32
through the entire process of everything
14:34
we do, which I think would help a lot of people
14:36
who can't afford to hire us to do it for
14:38
them. Now, of course, my concern came up with,
14:40
well, wait, why would we put out a guide,
14:42
a detailed step by step guide on
14:45
how to do every service we offer, won't that kill
14:47
our business? And my staff immediately responded
14:49
with the people who hire us to
14:51
do this for them don't care that
14:53
there's a do it yourself guide out there for fifteen
14:56
dollars. They're hiring fessionals to do it because
14:58
they want it done a specific way, or they just
15:00
don't wanna do them do it themselves, which I completely
15:03
respect. And I think that That
15:05
makes sense. All that will depend on how this
15:07
goes. So if you are interested
15:09
in what we're talking about in this show and
15:11
all the details, please go check out the extreme
15:13
privacy, mobile devices, ebook.
15:15
And finally, lot of people contact us
15:17
and ask us how they can support the show. How can we
15:19
send two dollars a month to the show? Do you have a
15:21
Patreon or something like that? And we
15:23
don't. I don't like the Patreon style.
15:25
It's just not my thing. I don't like asking for
15:28
donations. That's not my style either.
15:30
So if you truly want to just support this
15:32
show, but we don't have a way for you
15:34
to do that, buy an ebook. That
15:37
works great for us. It's less money than
15:39
you would spend trying to do a Patreon
15:41
to support a show, but more importantly,
15:44
you get something out of it. I don't want to
15:46
just ask for donations to make this dumb
15:48
little podcast, I'd rather make a product
15:50
that I think you might like and that you might be able
15:52
to use and then sell you that for little
15:54
amount and let that support the show
15:56
and not ads. Or sponsors or
15:58
donations. Alright. My spiel is
16:00
over. Let's get into the main topic, which is
16:02
mobile devices. Let's start over.
16:05
Let's don't make any assumptions of anything
16:07
we knew before this show. Maybe lot
16:09
of you already have a private secure mobile device
16:11
and a lot of this is already known to you. That's okay.
16:14
Bear with us. Maybe there'll be something in there
16:16
which does send you to something
16:18
new you can research. My plan for
16:20
this show is to just go
16:22
through the book, not everything, not
16:25
every step, not all the technical details.
16:27
Let's go through the main topics throughout
16:29
the entire book, which will help
16:31
us maybe guide us into
16:33
what we care most about when
16:35
it comes to our mobile devices. Now
16:38
in the introduction, I already laid out,
16:40
I think, why we care. Frankly, I
16:42
don't think anyone's listening to this show who doesn't
16:44
care, but we are carrying
16:46
around tracking devices in our pocket.
16:48
Tracking devices which we bought with our own money
16:51
services which we buy and then we allow
16:53
all these different services and companies and whatever
16:56
to monitor what we do and
16:58
then use that to make more profits.
17:01
I don't like that business model, so I
17:03
do what I can to mock up those
17:05
results so that they don't really impact
17:07
me. That's the whole idea of this.
17:09
There have been several clients who have hired us to
17:11
help them make private and secure devices,
17:14
but we're not doing anything
17:16
special that you can't do
17:18
We are just other human beings using
17:20
the same services and same technologies and
17:22
same free software out there which you can use,
17:24
which is again part of the motivation to
17:27
make this book. Anyone can
17:29
make themselves a completely private and secure
17:31
device with completely private and secure
17:33
cellular access. If you just
17:36
put the time into it. I will put a link to
17:38
the book and show notes, but let's jump
17:40
into it in order to get some
17:42
actual actionable items
17:45
out of it. Chapter one of the book
17:47
is device selection. Now the
17:49
first two chapters of this book, a
17:51
lot of people might say they're not really needed.
17:53
And I I can kind of agree with you on that.
17:55
The first two chapters go into device selection
17:58
and OS installation. It's no surprise.
18:01
I like graphene OS. And when my
18:03
clients need a private and secure device, I
18:05
want them to have a graphene OS Android
18:07
device. So this book
18:09
is not just here's
18:11
how to install Graphina Less. You don't
18:13
need me for that. Their website does a much better
18:15
job at that. But the first two chapters
18:17
get into how should we pick device and
18:19
how should we install our custom operating system
18:21
on it. Now, let's start with picking a device.
18:24
I am a firm believer that if you want
18:26
a truly private and secure
18:28
mobile device, you have to get new hardware
18:30
because whatever hardware you're using which
18:33
has that cellular account in your true name or
18:35
you've done a bunch of stuff in your true name, whatever
18:37
it might be. It's dirty. It's
18:39
tainted. It's infected with
18:42
you. So getting a new device
18:45
resets that clock and allows us to set everything
18:47
up right so that we don't have that
18:49
contamination. Now, could you wipe
18:51
out your iOS device or your Android device
18:53
and start over, of course, but you
18:55
never get a clean slate. Apple,
18:57
Google, etcetera are always collecting unique
19:00
hardware identifiers on their stock equipment.
19:02
There's not a whole lot you can do about that.
19:05
In the book, I have the Apple versus Google
19:07
discussion very quickly.
19:09
It very right up front. In
19:11
my opinion, there is no such thing
19:13
as a private Apple iOS
19:16
device. Apple is collecting constant
19:18
telemetry from your usage. They
19:20
are pushing you to use their iCloud system.
19:23
That is storing your data on their cloud,
19:25
probably most of it's not encrypted. And
19:28
worse, they require you to
19:30
have an Apple ID with them
19:32
connected to your device in order to download
19:34
any apps and use the phone the way it's intended
19:37
to be used. You it's
19:39
extremely difficult. To use an iOS
19:41
device without an Apple ID, not
19:43
impossible, but almost. In
19:45
past shows, I have requested my data
19:47
from Apple and I was shocked to learn what
19:50
they were storing. I was shocked that they were
19:52
monitoring the last podcast I listened
19:54
to and how far got into it and when I quit
19:56
stopped, or when I stopped listening to it, they're
19:58
storing all of that. By forcing you to have
20:00
an Apple ID on your mobile device
20:02
that allows them to store all the information
20:04
about you in the way you use that device
20:07
in their network. Now, of course, they say they don't
20:09
share that, they don't sell it. Okay.
20:11
That could be true, but you're collecting it
20:13
which always leads to a problem whether
20:15
through a breach or through a real employee
20:18
or something else. The simple
20:20
matter to me is, I
20:22
don't feel I should have to create
20:24
some type of online account through a big
20:26
conglomerate such as Apple or Google just
20:29
in order to use device, which
20:31
I paid for. Because of this, Apple
20:34
is out for me. I will not use an iOS product
20:36
and I encourage my clients to do the same.
20:38
That leaves us with Google. Stock
20:41
Android devices are really no better.
20:43
You don't have to have a Google account to use
20:45
them, but you do if you wanna download apps from
20:47
the Google Play Store, Google is
20:49
going to collect a lot of your information. It's
20:52
going to collect it at the base of that
20:54
operating system, and it's going to send data
20:56
to Google constantly without
20:59
you really understanding what they're doing
21:01
in the background. Therefore, I believe
21:03
the only viable option for us
21:05
for those enthusiasts who want to go to
21:07
the extreme is Grafting OS.
21:09
Grafting OS is an open source operating
21:11
system. It is based on Android, but it is focused
21:14
on privacy and security. I
21:16
prefer it for several reasons. One,
21:18
it's just minimalistic. It's
21:21
simple. It's a very hardened
21:23
but very minimal operating
21:26
system. That's important to me. I don't want a bunch
21:28
of junk. I don't want a bunch of stuff
21:30
that I can't remove, I just want
21:32
the necessities and let me take over
21:34
from there. Every decision about graphene
21:36
OS is based on private use security, mostly
21:39
around security, but also privacy. So you have a lot
21:41
of options on the graphene OS devices,
21:43
which you don't have on stock android devices.
21:46
The biggest reason I like graphene
21:48
a less better than all the other custom
21:50
android operating systems, it's
21:53
the updates. Every week, I'm getting an
21:55
update from Graph OS from their servers,
21:57
which is patching up phone abilities, it's
21:59
adding new features, repairing features, fixing
22:01
minor bugs, I don't get that
22:04
kind of update from Apple or Google. I only
22:06
get it from GraphinoS. I will go as far as
22:08
to say, I don't know of any
22:10
other custom operating system
22:12
for any mobile device or any
22:15
stock operating system of any mobile device,
22:17
which issues updates as fast as graphene
22:20
OS. Really important to me. This is where
22:22
I'm going to offend a lot of people. They're going
22:24
to say that I should be looking at other operating systems
22:26
I have. I think I've looked at all of them. I
22:28
like graphene OS the best. And
22:30
I think it is the cleanest most minimal
22:33
option we have to start our
22:35
private and secure device. Therefore, chapter
22:37
one of the book gets into device selection, you're going
22:39
to need a new device. Currently, I
22:41
only recommend people buy either the Google
22:44
Pixel six, six
22:46
pro 6A7
22:48
or seven pro. Graphite OS
22:51
requires a Google
22:53
Pixel device because of the
22:55
way that we can get into it, unlock
22:57
the boot loader. We can clear out
22:59
all the Google junk from it. We can then install
23:02
our own operating system and relock that boot
23:04
loader in a way that you can't do with
23:06
say a Samsung or something else.
23:08
Also, Google Pixel devices are
23:11
the most universal for practically any
23:13
other custom operating system you want to try.
23:15
If you don't like Graph OS and you want to try
23:17
a different operating system, it
23:20
very likely will work with a Google Pixel
23:22
device when it might not work with that
23:24
that one note that you bought two years ago.
23:26
So I only recommend those five devices
23:29
because we can install graphene OS on
23:31
them. Now the four a and
23:33
the five, those would work
23:35
too, but they
23:37
stop getting updates from Google
23:39
at the end of this year, which means they're probably not
23:41
going to be supported by graphing OS
23:44
more than maybe the end of this year or
23:46
early next year. So If you're buying
23:48
a new device, I only recommend the five that I
23:50
mentioned because you have five years
23:52
of support from Google, which
23:54
translates to also having support from
23:56
graphene OS. If you get one of those five devices,
23:59
you're good for several years and you don't have to worry
24:01
about not getting those updates. Of
24:03
those five, I prefer the
24:05
Pixel six a. It
24:08
is the cheap model, but
24:10
I don't think that's quite fair. They are very
24:12
affordable. I bought a bunch of
24:14
six days during the holiday season when they
24:16
were on sale for two hundred ninety dollars.
24:18
The current retail price is four forty nine, but
24:20
I see them often for anywhere from three hundred to
24:23
three hundred dollars brand new, sometimes even
24:25
in store at places like Best Buy. You'll have
24:27
to do your research there. I like
24:29
the six a mostly because of size of
24:31
those five devices. It is the smallest
24:33
in size. I don't like these big
24:35
pop tart phones. I miss the
24:37
original SE size, that four point
24:39
seven inch screen or that four inch screen something
24:41
around there. I don't like these
24:43
six point four inch screens. The
24:46
Pixel 6a, I believe, is a six point one inch,
24:48
and it's not extremely big. It's bigger than I
24:50
like. But of the options I have, it's
24:52
the smallest one. If the Pixel
24:55
eight comes out at the end of the year and they are
24:57
they rumored to have a smaller device which might
24:59
happen, If that does happen, I would probably
25:01
go to that just for the size alone.
25:04
The six six Pro seven and seven Pro,
25:06
they have better insides than the six
25:08
a. But you pay a premium for that.
25:10
But here's my thing. We should not be using our
25:12
mobile phones as entertainment devices. We should
25:14
not be using them as gaming devices should
25:16
not be watching four k videos on them all
25:18
day. We should not be processing files
25:21
and photos on our devices. That's what computers
25:23
are for. If you are only going to
25:25
use your mobile device as a communications
25:27
device, the six a is
25:29
more than enough for resources to get
25:31
that done. So for me, The six a is
25:33
where it's at. That's what I use every day, and
25:36
it's the most affordable and smallest of those
25:38
devices. Now from there, the book gets
25:40
into in stalling, graphene OS. I'm not
25:42
going to waste your time with that here.
25:44
And you don't need me to tell you that anyway. I
25:46
I steal the instructions from their website. Just
25:49
go to their website, they can walk you through. The only
25:51
thing I do in book is I walk through the different
25:53
options and I I change things just
25:55
a little bit just on personal preference. But
25:57
it wouldn't matter much anyway. So let's move past
25:59
that and get to chapter three, which is device
26:02
configuration. A lot of this is personal
26:04
preference, but I talk a bit about how I prefer
26:06
to change my quick launch menu in graphene
26:09
OS. How I prefer to add the
26:11
microphone access and camera access
26:13
buttons to that for easy access, because
26:16
I can use software switches to disable
26:18
the microphone and all the cameras. This is
26:20
a huge benefit of graphene OS.
26:23
Yeah, we could put stickers on our phone, yeah,
26:25
we could put physical micros or
26:27
microphone blockers. And those
26:30
might work, and that might even be an extra layer.
26:32
But if you are disciplined enough to
26:34
use your phone correctly, graphene OS
26:36
gives you the option to disable your cameras
26:39
and microphones so that when any
26:41
application tries to use them, it has
26:43
to prompt you first and make sure you
26:45
are okay with that. I leave my microphone
26:47
and camera blocked all times am I graphing
26:50
OS? And when I need to turn it on, it'll prompt
26:52
me and say, hey, you've got a call coming in. Do you want to answer
26:54
this call? Do you want me to turn on your microphone? Yes or
26:56
no? I can make that call then.
26:58
I actually don't use physical
27:01
microphone and camera blockers much
27:03
anymore. I trust my device
27:05
and I trust the software more than
27:07
I would say an iOS device or a stock
27:10
Android device. So I walk through that a bit Basically
27:12
in this chapter, I'm just walking through some custom
27:14
changes. I've talked before about
27:16
I like to make my display monochrome when
27:19
I'm doing communications such as email or
27:21
messaging It takes some of that fun
27:23
away, but also think it takes some of that
27:25
temptation away from using my phone
27:27
as an entertainment device. I
27:29
walk through how I put a shortcut on my menu
27:31
bar for that to immediately turn it from full
27:33
color to monochrome. Again, personal
27:35
preferences here. Most people don't care about that.
27:37
I won't spend much time. But next, I
27:39
talk about browsers, and this is something that's
27:42
changed a lot for me. In previous
27:44
books, I talked about Firefox Focus,
27:46
great product, it's a mobile browser,
27:49
which allows you to immediately clear your
27:51
history when you exit it. It's got some nice
27:53
features in it. I actually don't use it
27:55
anymore. I now rely on
27:57
the vanadium web browser. That's
27:59
the default web browser included with Graphino
28:02
West. It is Chromium based, but
28:04
it does not send any data to
28:06
Google. My reasoning here is simply
28:08
that this option is
28:10
almost maybe even better
28:13
than Firefox focused. But more so,
28:15
it's I don't want multiple apps I need
28:17
to worry about. I don't want multiple layers of
28:19
potential vulnerability. If I just have one browser,
28:21
then I just have one thing to worry about and one
28:23
thing to keep updated. I also trust
28:26
the work that graphene OS has put into
28:28
it in order to make it as secure as possible.
28:31
Now, I do walk through the book on some additional
28:33
changes I make, and I won't go through all
28:35
those here. If you're interested, go check that out. But
28:37
basically, I do tweak
28:39
a few things which I think could be bit better,
28:42
but also that might not be best
28:44
for global audiences, I just think it's better for
28:46
this audience for those of us who are really
28:48
interested in this. So some modifications
28:51
there, slight then walk through some of the
28:53
camera settings I change, mostly just
28:56
eliminating the sounds. I don't want the shutter
28:58
sound to go off. That that can be embarrassing when you're
29:00
trying to get a photo and not
29:02
be seen doing it. I enabled the gyroscope
29:04
on the camera. So just some little
29:06
things like that. I talk about ring tones a bit.
29:09
Mostly because we don't want our phone
29:11
going off when we're trying to be discreet doing
29:13
something. From there, I talk
29:15
about contacts and how I maintain
29:17
contacts. The short story
29:20
here is I maintain my
29:22
immediate contacts within
29:25
the native contacts app
29:27
on Graphino West because I want all of
29:30
my communications devices to be able to
29:32
access that information. Everything from signal
29:34
to my pseudo or whatever, I don't
29:36
synchronize it to anything. I
29:38
keep all my contacts in the in
29:40
the native contacts app within Ubuntu,
29:43
and I can export them to AVCF
29:46
file from there and import them into my phone. So
29:48
nothing too crazy there. That's all some
29:50
pretty standard stuff. Let's get into chapter
29:52
four because this is where things I think actually
29:54
get important DNS configuration.
29:57
DNS is very important. We've talked about it
30:00
a lot. DNS is what takes a
30:02
domain name such as intel techniques dot
30:04
com and translates that to an IP
30:06
address so that when you go to intel techniques
30:08
dot com, your device knows to go to my
30:10
server IP address and grab my website.
30:12
DNS is extremely vital for
30:15
this whole Internet thing to function. By
30:17
default, the DNS provider
30:20
of a Graph OS device is whatever the
30:22
network is using. So if you are on
30:24
an AT and T network, then
30:26
your default DNS provider is AT and T.
30:28
They are doing your DNS queries for you.
30:31
If you're on your home WiFi, it's whatever your WiFi
30:33
is using. If you're using a stock Android
30:35
device, you're probably using Google as your
30:37
DNS. And sometimes even when
30:39
you have a VPN set up on your iOS
30:41
device, Apple's bypassing that and using
30:43
their own connection to get data. So
30:46
with graphing OS, we have actual
30:48
control of this by default. It's using
30:50
whatever your network uses, but we can
30:52
change that. In the book, I
30:55
talk specifically and I recommend next
30:57
DNS. I like this for two reasons.
31:00
One is it's a third
31:02
party DNS provider, which I trust. So
31:04
the queries are not being done by my Internet
31:06
service provider, who I know is going to abuse
31:08
them. It's being done by a privacy respecting
31:11
DNS provider. But that's not
31:13
the big reason I like them. There's
31:15
tons of privacy respecting DNS
31:18
providers. What I care about is filtering.
31:21
Fulfuring is where I can tell NextD
31:23
and S, hey, block
31:26
these one hundred thousand
31:28
known trackers, malicious
31:31
things, bots, ads,
31:33
etcetera, and don't let them ever
31:35
even come into my phone. Then when
31:37
I go to yahoo dot com and I load the page,
31:40
a lot of the junk doesn't load because next
31:42
DNS, my DNS provider isn't letting
31:44
that load. That's happening way
31:46
before an application would
31:48
be required on my device. Now,
31:50
in the past, I've talked about application
31:53
firewalls on a mobile device. I've
31:55
talked about block data on Android. I've
31:57
talked about lockdown on iOS.
32:00
I don't use any of those anymore. I
32:02
believe filtering by your DNS
32:04
is superior to an application based
32:07
solution. It requires less
32:09
overhead. It requires less layers to
32:11
go wrong, and it also doesn't conflict
32:13
with things like VPN applications, which
32:16
don't like it when you're trying to do a firewall in
32:18
a VPN at the same time. I have
32:20
no blockade a type
32:22
stuff on my mobile devices. I
32:24
use DNS to block it. The book gets
32:27
into a lot of detail about my exact settings.
32:29
I won't bore you with all that here. But
32:31
the more important thing is in the book, I'm able
32:33
to put lots of screenshots to say, while
32:35
you're configuring this, it should look like this.
32:38
Your should look like this. And if so, okay,
32:40
you're on the right track. Here's where you make that decision
32:42
on a, b and c. Default filtering
32:44
is great. But custom filtering
32:46
is where the real power is. And I
32:48
do some examples in the book to where I say, alright,
32:51
let's let's install an app, let's launch
32:53
that app, and let's monitor our
32:55
DNS requests, those DNS
32:57
queries coming out of our mobile device. That's
33:00
where we can see. Okay. That app has
33:03
some analytics stuff it's sending out.
33:05
That app has telemetry in it. Let's
33:07
block that. A lot of apps will
33:09
say don't don't
33:11
allow me to send statistics
33:14
out to my owner. Okay? They
33:16
often don't mean it. They still send stuff
33:18
out anyway. What we can do
33:20
with NextDNS is we can go in and say,
33:23
this application here uses Braze
33:25
to send analytical data their
33:27
headquarters. Let's block that connection because
33:30
it doesn't have anything. Head doesn't have any
33:32
impact on the usage. It doesn't restrict
33:34
me in any way. It's just sending data out that
33:36
I don't want them to have. So let's block that.
33:38
That entire chapter really gets into the
33:41
weeds of what to block, what not to block,
33:43
and I think that DNS
33:45
is probably one of the most vital
33:48
things that is overlooked by people
33:50
creating a private secure device. You
33:52
could have the most private and secure mobile device
33:54
ever invented on the planet and then go
33:56
to Facebook and let them start tracking what you're
33:58
doing and you've lost so much of that.
34:01
With DNS, we can say, don't
34:03
ever connect to any face book domains. I
34:05
don't want that, leave that out. Finally,
34:07
Next DNS allows us to disable the
34:09
login completely once we know everything is set
34:12
up the way we want it. Once you can see that everything's
34:14
running, you're not adding bunch of new stuff to your device,
34:16
you can turn that logging off completely so that
34:18
there's not this constant documentation of
34:20
every website or every domain that you're going to,
34:23
we can just disable that, which
34:25
you can't do with your ISP. Chapter
34:27
five gets into push services. I talked about
34:29
this bit the last couple of shows.
34:32
Push services allows us to
34:34
get notifications on our devices. That
34:36
typical Apple iOS or Google
34:38
device which you have is getting push
34:40
services through Apple or Google in
34:42
order to tell you, hey, you just got a text message.
34:44
Hey, you've got a VoIP call coming in. Hey, you've
34:46
got this alert over here. Now,
34:49
in the past 290Extreme Edition,
34:51
I was pretty strong on we
34:54
don't need this stuff. We If
34:56
you go this far to create an ungoogled
34:59
device, you don't need to introduce
35:01
Google back into the mix just so that you can know
35:03
every time someone texts you. From a
35:05
personal view, I still kind of
35:07
stand by that, but that's because I don't
35:09
need push services. I don't need
35:11
to be notified of incoming text messages or
35:14
emails. I check them when I can
35:16
check them and I don't want my phone buzzing,
35:18
dinging, ringing, etcetera, whenever
35:20
I'm not ready to check my communications. I
35:22
have adopted a pull lifestyle
35:25
instead of a push lifestyle. However,
35:27
that doesn't work for most of my clients.
35:30
And frankly, I I it shouldn't
35:32
work for most people. Let's if you're
35:34
if you have children in school and they need to
35:36
get a hold of you via tech or a phone call, but you don't
35:38
have any kind of push services, so you can't be ready
35:41
for that. That could be very damaging.
35:43
So I completely respect that
35:46
most people cannot and probably should
35:48
not completely eliminate push services
35:50
from their mobile device. It's what makes
35:53
these things smart. Of all of my
35:55
clients who have embraced graphene OS
35:57
as an ungoogled mobile device, I
35:59
would say over ninety percent of them have push
36:01
services enabled, and I am completely okay
36:03
with that. I just don't use it in my
36:05
life because I don't need it. Most
36:08
people need it, and frankly, most people want
36:10
it. So I dedicated an entire chapter
36:12
to push services, but let's talk about the
36:14
the brief version here. For on Google
36:16
devices, you have pretty much two options. You
36:19
have micro g, which is an open
36:21
source, mostly open source version
36:23
of Google's drivers on your device
36:26
at the operating system level, which will allow
36:28
your device to receive notifications and any
36:30
push services. And then you have
36:32
the stock Google push
36:35
services, the Google framework but
36:38
in a sandboxed environment within
36:40
graphene OS. That is the way I
36:42
prefer it. If you're going to use push services,
36:46
I believe the implementation in Graphino
36:48
West using the actual Google
36:50
push services but sandboxed
36:52
into a limited application, which doesn't
36:54
have root access to your entire device, is
36:57
superior than putting micro g
36:59
and letting it have unfettered access
37:01
to everything. That statement has upset
37:03
a lot of people. I can hear your keyboard
37:05
typing right now. This is just my opinion.
37:07
You might disagree. I think
37:09
using Graph OS and enabling their
37:12
push service implementation is
37:14
the way to go if you need it. It's also extremely
37:16
easy to disable any time you want. This
37:18
becomes extremely important when you
37:20
need to accept VoIP phone
37:23
calls or you need to be notified of emails or
37:25
text messages, which we get into quite a bit in
37:27
the book, I already see that I'm supposed
37:29
to be at about the twenty minute mark here,
37:31
and we are way past that. So let's keep moving
37:33
on this. Again, the book is more detailed.
37:36
I'm just trying that overview of what we
37:38
care about when it comes to mobile devices. The
37:40
bottom line here is most people
37:43
I know who embrace Graph
37:45
OS also embrace Google's
37:47
push services in a sandbox limited
37:50
way through GraphinoS. I
37:53
think that's the best way to do it. Next, chapter
37:55
six is application installation. And while
37:57
I'm upsetting people, let's continue that train,
38:00
I still recommend F droid
38:03
and Aurora store. Now
38:05
every week, at least once a week,
38:08
someone e mails me and says you really
38:10
need to stop recommending f Reuters or Aurora
38:12
store. There's all kinds of problems. There's all kinds
38:14
of They're bad bad things. They're borderline
38:16
malicious. Blah blah blah blah. Almost
38:19
every single one of those emails refers
38:22
to one single blog post
38:24
of person who seemed quite
38:26
upset at Eftroid and outlines
38:28
all the problems everything from their websites
38:30
ugly too. They don't update it enough. My
38:32
stance is this. If you are truly
38:35
worried, about being tracked
38:38
in any way possible on
38:40
a mobile device, then you should not
38:43
be using a mobile device. If
38:45
you're expecting absolute perfection
38:48
of no application knows anything you're ever
38:50
doing on this thing and no cell phone company
38:52
knows anywhere you are, then a mobile device
38:54
is not for you. We have to have some realistic
38:57
expectations. Now, the blog post
38:59
I'm talking about, their solution, instead
39:01
of f droid and Aurora Store, is
39:03
to install the Google Play Store,
39:06
sign in to your Google account, and just download
39:08
your apps from Google, which I
39:10
don't see any way that
39:12
is better from a privacy perspective. The
39:15
whole point of a Graphino's device is you
39:17
don't need a Google account in order to use it.
39:19
So connecting your Google account
39:21
to your device in order to avoid using
39:23
something like F droid. I don't
39:25
get it. Maybe you disagree and that's
39:27
fine. For most people out there that
39:29
just seems backwards to me. So
39:31
chapter six walks you through proper eff joint
39:34
installation, proper eff storage configuration?
39:36
What should we turn off? What should we change? How
39:38
should we do the Aurora Store? What do we need to change
39:40
to make Aurora Store work on any other website?
39:42
Which one's the Google Play Store? It's
39:44
stuff I've talked about before. Some of it
39:46
is in extreme privacy fourth edition.
39:48
I just tried to update that and really make
39:51
everything step by step. So
39:53
you there's really no leniency
39:55
there to maybe make the wrong decision.
39:58
Again, these are my opinions and they might not
40:00
be yours, but the book tries to give you
40:02
here's the way I do it from my clients and you can
40:04
adopt or adapt from there. That chapter
40:07
also gets into using NextDNS
40:09
while you are in stalling your applications to
40:12
see what they are doing behind your back
40:14
and blocking that when necessary. Let's
40:16
fast forward a bit here and let's talk about chapter seven which
40:18
is cellular service and this is where
40:21
we start to get into, okay, now that we have
40:23
this device, now that we have it set
40:25
up the way we want it, how do we connect
40:27
it because we need that cellular service. Now,
40:30
this chapter is the one chapter
40:33
which is heavily focused for US audiences
40:35
because that's what I know, but the other
40:37
chapters get into more international considerations
40:40
as well. I do talk about mobile,
40:43
which is a T Mobile reseller. I still
40:45
think that's one of our best options because
40:47
we can provide any alias name we want.
40:49
We can provide masked debit
40:51
card payments through something like privacy dot com. We
40:53
can use secondary credit cards. And
40:55
we're not buying it directly from T Mobile. We're buying
40:58
it from a reseller. I think that's important.
41:00
Not only because they don't verify information you
41:02
give them, but also we have at least one
41:04
small, very thin layer between
41:07
us and the telecom themselves.
41:09
The big difference here from previous
41:12
writings is we have adopted
41:14
the eSIM option more
41:17
than the physical SIM. In the past, I've always
41:19
talked about, you get a physical mint
41:21
SIM card or whatever service you use, get your get
41:23
your SIM card, have them send it to you, have them ship it to
41:25
you. Okay. Well, now we have connection to our home
41:27
address or to a PO box or something where
41:29
we have access. With
41:31
the eSIM, we can order our service
41:34
online, we can program it and be ready
41:36
to go that day without ever giving a home
41:38
address or even a PO box in the area
41:40
you live. Now part of that might
41:42
be pointless because the cellular provider
41:44
is going to know what towers you're connecting to
41:46
they already know what general area you're in, but
41:48
I don't have to give them physical address.
41:51
For most of our clients, we
41:53
issue eSIMs and program their
41:55
phones, we don't rely on physical SIM cards.
41:57
I explain a lot about that process, about the
41:59
programming process. It's not too complicated,
42:02
but some services make it harder than others.
42:04
Specifically, I talk about some problems with However,
42:07
you can get a right now,
42:09
it's a thirty day free trial with
42:11
an eSIM. I can get on chat
42:14
with Met Mobile on a website behind
42:16
a VPN and have one month of free
42:18
cell phone service without giving them any
42:20
real information about me or
42:23
any kind of payment. That's quite nice.
42:25
I also talk about other providers. I talk
42:27
about telo, TELL0, which is an
42:29
option I've used. They are also a
42:31
T Mobile reseller, but you can buy just
42:33
a number. You can buy just data. You can
42:35
buy limited data. I have clients
42:38
who have nine dollar monthly plans
42:40
through telo that's all they need for
42:43
everything that they need for that phone. So I
42:45
walk you through some of those options. I'm
42:47
not a total meant fanboy,
42:50
especially if they're going to sell out the T Mobile,
42:52
so we have to have other options. I try
42:54
to be a bit more fair in this writing
42:56
to include many more options which
42:58
might give you a wider range
43:00
of choices. The other beauty of eSIM
43:02
is we can have multiple accounts. I can have
43:05
five cellular accounts, each with their own
43:07
e SIM programming, and I can enable and disable
43:09
each one one at a time and use any tower, any
43:12
service I want. I talk a lot about secondary
43:14
accounts, affordable secondary accounts,
43:17
and how you can have multiple real
43:19
cellular numbers, but can never connect
43:21
to that cellular account. We can use WiFi
43:23
calling. We there's all kinds of options here.
43:25
I have clients who want
43:27
a burner true cell phone number, which
43:29
they can provide to their bank when they have to log in,
43:31
but they don't ever want that number to connect
43:34
to a cell phone tower and be connected to that profile.
43:36
So we can just disable that when we don't need
43:38
it. So you have a lot of options with
43:40
graphing OS and with the Pixel. You
43:43
have a physical SIM slot, but you
43:45
also have that eSIM slot which you can
43:47
program and that just opens up
43:49
so many new opportunities especially
43:52
when we get into data only plans which we'll talk
43:54
about in just a moment. I do also talk
43:56
about AT and T and Verizon. I'm not stuck
43:58
on T Mobile. I know that their service isn't
44:00
great everywhere in the country, so I do give
44:02
you some options for them. And again, they're
44:04
pretty cheap at about fifteen bucks a month
44:06
for everything you would need. Overall, that
44:09
chapter is just designed to say here
44:11
are some options you might not have
44:13
known about with eSIM
44:15
stuff. And and also here's the way that GraphinoS
44:17
will allow you to disable not only your
44:20
but also your physical SIM, which is another important
44:22
thing. I can disable both my physical
44:24
SIM and my e SIM. And then if my phone
44:26
ever leaves airplane mode for whatever reason,
44:29
yeah, I'm probably going to be throwing out some
44:31
signals there. Yeah, I'm probably gonna be
44:33
sniffing around the the closest tower.
44:35
But my physical SIM card,
44:38
which is an connected to an account is not going
44:40
to connect. And my eSIM account,
44:42
which is not going to connect because
44:44
it's disabled, it's not just broadcasting,
44:47
hey, here I am. So my phone's out
44:49
there, but my accounts are not out there. So
44:51
I think that's another nice feature we have.
44:54
Most devices tell you if you want
44:56
to disable the physical SIM card,
44:58
remove it. Graphina West, let's
45:00
just say, no, just toggle that switch off
45:02
and don't connect that card anymore. I
45:04
like that feature. Alright. Chapter eight gets into VoIP
45:06
service. VoIP service.
45:09
A lot of this is brought over
45:11
from Privacy Fourth Edition, but a
45:13
lot of it is also new. Now,
45:16
I've talked before about VoIP. This is
45:18
where we can buy phone numbers, Internet
45:21
based true phone numbers, and we
45:23
can set up an account with a service
45:25
which allows us to use that phone number for
45:28
phone calls and text messages, but
45:30
it's not a cellular number. It's not connected
45:32
to a cell phone tower. It's not It doesn't
45:34
know where we're at at all times. It's not
45:36
tracking our location. I
45:38
rely on VoIP telephone numbers at
45:41
all times. I don't ever use my true cellular
45:43
number because that's connected to my location at all
45:45
times. So I use voice over IP
45:47
numbers. Now in the past, it's
45:49
been Twilio versus Telmex.
45:52
And it still is Twilio versus
45:54
Telmex. But before we get into that,
45:57
I get into domain registration. If
45:59
you plan to make a Twilio
46:01
or Telmex VoIP account, you're
46:04
going to have to convince them that you
46:06
are worthy of paying them money for their
46:08
services. They only want businesses. If
46:10
you sign up with a Gmail or a Protonmail or
46:13
forbid a to Tenoda email,
46:15
your account's gonna get suspended. They're not gonna give
46:17
you access. So I talk bit in this book about
46:19
what we do every client
46:21
when they get a new device, they also get a new
46:23
domain with wild card emailing so
46:26
that they can have a what appears
46:28
to be a business, a true business domain
46:30
to sign up for services. What I
46:32
talk about in the book specifically is how to
46:34
find dropped domains, not
46:37
expired domains, dropped domains,
46:39
which had a business reference, which
46:41
had a history on all the services, which these
46:43
companies use to vet their customers to
46:46
basically bypass all of
46:48
these all the scrutiny to
46:50
see if you really are a business. I won't get
46:53
into every detail here on a public show, but
46:55
it is in the book to talk about here's
46:57
the easiest way to get a business
46:59
domain which has been around for fifteen
47:01
years. It's got stuff on archive dot
47:03
org. It's got stuff and all the marketing SEO
47:06
type stuff. And when you take it over, you can
47:08
now be the owner of that and use wildcard email
47:10
addresses for that and probably
47:12
pass the scrutiny of places such
47:14
as Telmex and Twilio. We're not
47:16
doing any fraud. We just want to
47:18
pay them to buy their service. Unfortunately,
47:21
today, you have to prove you're worthy
47:24
of that. It's just the way it is. So
47:26
talk very specifically how you can spend nine bucks
47:28
a year and have unlimited use of
47:30
a an existing vetted
47:32
business domain, including
47:34
all of the email forwarding as well. You do not
47:36
need a host for that. After
47:39
that, I get into all the VoIP stuff.
47:41
So let's jump into that now. I still prefer
47:43
Twilio for all of my VoIP
47:45
needs. When you see
47:47
third party providers that offer a burner
47:51
application or second line, whatever it might
47:53
be, They're just buying Twilio numbers
47:55
and upcharging you for it. So many
47:57
people constantly say, oh, you should recommend JMP
47:59
chat because you can buy a phone number
48:02
for only three bucks a month. Yeah, but
48:04
they're just getting it from Twilio for dollar
48:06
a month. I'll just go get it from Twilio for a dollar
48:08
a month, not pay the extra two dollars a month and
48:10
have the exact same number and the exact
48:12
same service I could ahead, I'm just cutting
48:14
out the middleman. So I don't like
48:16
a lot of these middleman applications when
48:18
I can just go do it myself. Now
48:21
I walk through all of the settings
48:23
currently for Twilio, which
48:25
includes ringing your phone.
48:28
And past, I've used Lynnphone
48:31
in my books to talk about using
48:33
voice over IP to make and receive telephone
48:35
calls. I do not use Lynnphone on a mobile
48:38
device anymore. Their desktop applications
48:40
I have a use for still, but
48:42
I don't like Lynnphone for iOS
48:44
or Android to just not reliable anymore.
48:47
I have switched one hundred percent to
48:49
SIP and ETIC, I
48:51
believe. And the book walks through
48:53
every setting. If you are using Symptic
48:56
for your VoIP calls and you're having an issue,
48:58
it's a configuration. And the default
49:00
configuration is not good enough. So I do walk through
49:02
all the details and you can kind of play with them if
49:04
you want to get it right. But basically, symptomatic
49:08
with Twilio even or Telmex should
49:11
absolutely reliably ring
49:13
your phone when a call comes in as
49:15
long as the background service is running
49:17
on your device. And you do not need push
49:20
notifications for that to happen. That's
49:22
why I like Symantec. I can leave that on
49:24
and I have dozens of phone numbers
49:26
through various VoIP providers, and all of them
49:28
will ring my phone and I can answer a call,
49:31
which is not possible on services
49:33
which we rely on push occasions.
49:35
That's why I like hyphenetic for that. Again,
49:38
I get into a lot of detail there. As
49:40
far as Twilio, most of the steps
49:42
from privacy fourth edition work
49:44
I did have to tweak a couple of things,
49:47
mostly because Twilio has changed their menus,
49:49
but nothing more than that. So a
49:51
lot of that is going to be recycled from
49:54
the fourth edition, including setting everything
49:56
up for SMS. I still
49:58
prefer to forward my incoming
50:00
SMS call or SMS text
50:02
messages from Twilio or Telmex
50:04
whoever to email. I don't
50:07
need to ever send SMS messages
50:09
from those accounts. That's not what that's for.
50:12
And that is going to cause more scrutiny with
50:15
the VoIP services. They might want you
50:17
to register as an email sender like
50:19
a a marketing person and we don't want that.
50:22
I use voice over IP through
50:24
Twilio and Telmex for receiving
50:26
voice calls, making voice
50:28
calls, and receiving SMS
50:30
text messages via email. That's
50:33
it. That's the way I recommend that most
50:35
people use them. That brings us into Telmex,
50:37
which I've had a love hate
50:40
relationship with both Twilio and Telmix. I've had
50:42
my problems with both of them, more
50:44
so Telmix in the past. There
50:47
there are some pros and cons of Telenex.
50:50
The pro is simply is cheaper. You
50:52
you pay a bit less per month
50:54
for a number. But
50:56
there are some cons. Telmex
50:58
will only give you an account if you are a confirmed
51:00
business, but that's probably pretty fair to say
51:02
with Twilio now too, so that's a wash. My
51:05
biggest complaint about Talnix is they
51:07
no longer provide any actual
51:09
customer support. You can open a support
51:11
ticket and you will get canned messages and then
51:13
they will close the ticket and you will not actually get
51:16
help with your problem. I've seen that time and time
51:18
again. Telnex does not
51:20
provide voice mail. Twilio does. Telnex
51:23
does not allow you to delete your user
51:25
logs. Twilio does. That's kind
51:27
of a big one for me. My other big gripe with
51:29
Telenex is they will suspend your paid
51:31
account with a balance on it if they don't
51:33
like what you're doing. And when
51:35
that happened to me, I ask them
51:37
about why it happened and I was ignored.
51:40
Now, if you have a Telmex
51:42
account, great. There's no reason
51:44
to leave them. If you have a Twilio
51:46
count, great. No reason to leave
51:48
them either. If you had to choose one, I
51:50
think Twilio is the better option.
51:52
However, I'll explain this in a moment,
51:54
but I had conversation with the Telmex CEO
51:57
OSINT, and I really I think
51:59
I overwhelmed him with my frustration about his
52:01
company, and he is he has reinstated
52:04
a an affiliate link,
52:06
which will give you twenty dollars in free usage.
52:09
And then it gives me my test account,
52:11
which we do our research with twenty dollars
52:13
that we can use for free too. I don't get any money
52:15
from them. We just get free credits that people use it.
52:17
So I put that in the book. Whether
52:20
it works or not, I don't know. They've kicked my
52:22
affiliates out several times, so who
52:24
knows if this will be any better? If you have neither,
52:26
I would start with Twilio and see if it meets your
52:28
needs. If you can't get Twilio
52:31
account, I would try Telmex. They might be a bit
52:34
a bit less scrutiny now. I don't know
52:36
because I don't really have a good way to try that,
52:38
but you do have options. Most
52:40
people if you're like me, you want
52:42
both and you want some funding within
52:45
both to have redundant options. I
52:47
think that's always great too. So I also
52:49
walk through configuration, next
52:51
configuration with sat Sipanetic and
52:54
basically the exact same thing we had in the book
52:56
just with updates. I do
52:58
talk about my pseudo MySuedo is
53:00
a VoIP reseller. Basically, they
53:02
have an app which will let you have up to nine
53:04
telephone numbers, all isolated within
53:06
profiles. You can make calls. You can
53:09
receive calls. You can send text. You can receive
53:11
text. Financially, it
53:13
is cheaper to get Twilio
53:15
numbers through my pseudo than
53:17
to buy them yourself because they buy
53:19
in book. The big problem
53:22
with my pseudo is you have
53:24
to have another device which
53:26
does have either Google services or Apple
53:29
services in order to pay for your account.
53:31
I have been talking with the CEO about
53:33
resolution possibly to this I don't
53:36
have anything to report right now, but it's
53:38
on their radar. So if you want my suit
53:40
on your graphene OS device, you have
53:42
to pair it with another device
53:45
which has that same my pseudo connection
53:47
on it and a way to pay for it such as
53:49
through Google Pay or Apple's App
53:51
Store. If a solution comes up for
53:53
that, I think I'll be one of the first to
53:56
know and therefore you will be one of the first
53:58
to know about it. What do I do?
54:00
I do have my suit on my graphene OS
54:02
device. And it works great.
54:05
And if I enable Google's push services
54:08
sandboxed within Graphite
54:10
OS, calls come through just fine. I
54:12
get notified of text everything works great
54:14
except I can't renew. So what I do
54:17
is I have an old iPhone SE original,
54:19
old school and it has one app
54:21
on it, MySoto. And once a year, I
54:23
OSINT that app, I boot that phone up, I charge
54:25
it, I open the app, I renew my
54:28
subscription to MySoto, I
54:30
use a gift card
54:32
to fund the account. And then when I renew
54:34
that, since I've paired those two together,
54:36
it automatically renews my graphics device.
54:38
And I don't turn that phone on for another year.
54:41
I know that's getting maybe out of scope
54:43
for some people, but my suit is the
54:45
easiest of all these options and it's actually
54:47
the cheapest. So I understand the
54:49
need for it. I have one
54:51
of everything, so I want Twilio, I want Telnix,
54:54
I want my suit, I want all these options
54:56
because I like the redundancy. The book also
54:58
talks about porting. I won't get into that.
55:00
Nothing new really has changed there. It also talks
55:02
about VoIP suite. I've talked about
55:04
that before. It's the open source application
55:07
created by a member of my online
55:09
video training. They now have
55:11
a an Android app,
55:14
which does work on Graph OS. It has its own
55:16
push services in it. Right
55:18
now, it's not on Android yet, but
55:20
they have submitted to that. So I haven't tested
55:22
it fully yet, but I do have just a blurb
55:24
in there of if that
55:26
makes sense to you, go do it. allows you to send
55:28
and receive text messages from
55:30
Telmex or Twilio within
55:33
an app with notifications instead
55:35
of using the email route. So haven't tested
55:37
that thoroughly. I don't know how the app
55:39
works compared to the web based app.
55:42
But it still requires you to set up
55:44
on your own self hosted online
55:46
server, which most of my clients just said
55:48
we don't wanna deal with that. So they
55:50
would rather just get the email. I picture this show
55:52
running an hour even, and we're not
55:54
even, guess, we are halfway through. Alright.
55:56
Let's keep pushing through You're tired of my voice.
55:59
Maybe pause this and pick it up tomorrow, but let's keep pushing.
56:01
Let's talk about chapter nine data service.
56:04
This is something brand new I've been using. A
56:06
lot of my clients don't want a traditional
56:09
cellular account. They don't want that mobile
56:11
T Mobile AT and T Verizon account.
56:13
They want something that doesn't have
56:15
a phone number attached to it. They just need data. They're
56:17
not using their phone number anyway. Why am I paying for this phone
56:20
number? I'm never using it. I just need some data
56:22
and I don't need a whole lot of it. So I do
56:24
talk a bit about data only
56:26
service plans. These are providers which will
56:28
say, we'll sell you data
56:30
and you can use that data on your device any way
56:32
you want it. And then when you're out, you're out and
56:34
you buy more data or you don't. You
56:36
don't need a phone number. You don't need a commitment.
56:39
You don't need a contract. You don't need anything.
56:41
You don't need AutoPay every month,
56:44
just buy data when you want the data, and
56:46
there are some very valuable uses
56:48
for that. There are plenty of online providers
56:51
which are resellers which will sell you
56:53
this data. These a lot of these are ran out
56:55
of Hong Kong, and they have contracts with
56:57
all the different carriers all over the world, and
56:59
they're designed for travelers. If you are person
57:01
going to the UK, your AT and T
57:03
might not work there, so you might want to buy a
57:06
UK provider just some data for the
57:08
week, that way you have access to your mobile
57:10
device. I don't use
57:12
those providers too much. Instead, I
57:15
use cellular services by
57:18
Twilio and Telmex. You
57:20
can buy physical SIM cards from Twilio
57:22
and Telmex, which you can pop
57:24
into your device, and they can
57:26
access data from any
57:28
major carrier. So if you're in the US,
57:31
wherever you are, it will connect you to the closest
57:33
AT and T T Mobile Verizon,
57:36
maybe US cellular tower, and let
57:38
you use that tower only for data,
57:41
and then pay per megabyte at
57:44
those providers. And this whole chapter walks you through
57:46
that entire process. There are many considerations
57:48
here. I have many warnings about it,
57:50
but it does work for a lot of people. What
57:53
I like is to have it as a secondary
57:55
or backup option. I prefer
57:57
Twilio over Telmex because Twilio
58:00
has international capabilities and
58:03
Twilio allows eSIM programming.
58:06
On my Graphio's device, I have an
58:08
OSINT for Twilio. I can
58:10
be anywhere in the world, turn that
58:12
on and have data, and I pay ten
58:14
cents per megabyte, which is a lot So
58:16
if you're going to do that, please heed
58:18
the warnings in the book about limiting your
58:21
background data, turning off auto updates,
58:23
make sure that your phones not downloaded
58:25
much of data in the background eating up
58:27
all of your ten cents per megabyte and now you
58:29
have this big bill and you're pissed off
58:31
at me. Telmics is
58:33
cheaper, much cheaper. It's
58:36
one cent per megabyte and
58:38
only two dollars a month for access
58:40
instead of three dollars month from Twilio,
58:43
especially if you want the Verizon Towers. Again,
58:45
we're we're we're over on time, so
58:47
I won't get too much into it. The book has much more
58:50
detail on that. What do I do?
58:52
I use Twilio for all of my international
58:54
data and I use Telmex
58:57
for a lot of my domestic data as a backup
58:59
if I don't want my account
59:01
through t mobile slash mint for
59:03
whatever reason. The best part for me is
59:06
I can go to any country, connect to their cell
59:08
towers, Those cell towers know
59:10
my device. They get a unique ID.
59:12
They know my OSINT but they don't know
59:14
who I am. Instead, they are
59:16
billing Twilio for my usage and
59:18
Twilio is just deducting it from my balance.
59:20
And if you're careful and only turn on your phone when
59:22
you need to access your email, when you need to make a signal
59:25
call, when you need to check an instant message, you
59:27
don't use that much data if you're not doing
59:29
other things in the background. I've
59:32
I took a month and relied just on
59:35
one of these programs and it was like nine bucks
59:37
for the month. It was actually cheaper than my
59:39
subscription. So you have to be careful
59:42
but if you're only using your phone for communications
59:44
and not watching four k video, you
59:46
could get by on one of these alone and not
59:48
have any phone number assigned to your account, which really
59:51
reduces a lot of issues. It
59:53
eliminates the possibility
59:55
of a SIM swap because you don't have a phone
59:57
number to even start the account with. With,
59:59
and the eSense can only be programmed one
1:00:01
time. You can't change those anyway. It
1:00:04
also prevents a lot of tracking
1:00:06
which can be done based on your cell phone number
1:00:08
because you don't have a cell phone number. You
1:00:10
have an account, but you might be connected
1:00:12
to an AT and T tower for five minutes and then connected
1:00:14
to a Verizon tower after that. So
1:00:17
you are a much smaller needle and
1:00:19
a much larger haystack. But again,
1:00:21
there are many warnings with this, so
1:00:24
don't just jump into that. Read
1:00:26
everything and understand all the warnings before
1:00:28
you say whether or not that might be for you.
1:00:30
Alright. Let's fast forward. This is getting
1:00:32
way too long. Chapter ten, secure communications,
1:00:35
I talk again about my
1:00:37
preferences, water, signal, whatever it
1:00:39
might be, proton male, to to nota,
1:00:42
any kind of settings. But a lot of that has
1:00:44
not changed and we've talked about so much of
1:00:46
this on the show. I don't feel like we need to revisit
1:00:48
every part of it. You probably have
1:00:50
already established your preferred secure
1:00:53
communications. If you have not, then you should
1:00:55
do that right away. I
1:00:57
prefer signal for most things because
1:01:00
it's the easiest for other people
1:01:02
to use. It's the easiest for my
1:01:04
friends and family to adopt versus I
1:01:06
had to remember a password for wire,
1:01:08
what? I don't just text me. Signal
1:01:11
is just the easiest for conversion in my
1:01:13
opinion, but you can read about some issues
1:01:15
there. Chapter eleven gets into VPN configuration,
1:01:17
but This is not a show about
1:01:19
VPNs. This is a show about mobile
1:01:22
devices. The only thing I do talk in
1:01:24
there about with mobile devices is
1:01:26
how I always have VPNs ready
1:01:28
on my mobile device because of issues
1:01:30
I've run into. For example, if I'm
1:01:32
in a country, which is not supported
1:01:35
by say my pseudo. I
1:01:37
can't make a phone call on those numbers because
1:01:39
I'm on that country's IP address. But I
1:01:41
can launch my VPN, connect to a US server,
1:01:43
and now I can use my pseudo again. So those things
1:01:45
are important. I talk a lot about clients
1:01:47
who have they have to use their banking
1:01:49
app on their phone. They have deposit checks,
1:01:52
they have to transfer money, whatever. Every
1:01:54
time they log into that banking app, it checks
1:01:56
for VPNs. They they now need a VPN,
1:01:59
which has a dedicated IP address, which
1:02:01
can bypass that restriction. So
1:02:03
we have some situations where
1:02:06
you absolutely need a VPN on
1:02:08
home, but I do also talk a lot in that
1:02:10
chapter about how I am not always connected
1:02:12
to a VPM on my device. My device
1:02:14
isn't calling out to Google and Apple. I don't worry
1:02:16
about that. My device service is not connected
1:02:19
to my name at all. Do I care
1:02:21
that T Mobile knows I'm checking my
1:02:23
proton mail? I don't care. It doesn't.
1:02:26
Tell them my content. They don't see anything about
1:02:28
what I'm doing. I don't care that T Mobile
1:02:30
knows that Mobile has
1:02:32
sold a prepaid plan to
1:02:34
an anonymous person who happens use
1:02:36
proton mail. That doesn't hurt
1:02:39
me in any way. So one thing I talk about
1:02:41
in the book is that I don't always use
1:02:43
a VPN on my mobile device. If it's not
1:02:45
necessary and that's gonna really
1:02:47
exceed the scope of this show. If you want more details,
1:02:49
obviously, it's there. I talk a bit about device
1:02:51
customization, how you might
1:02:53
want a different launcher for your phone. Graphiness
1:02:56
is great. It's minimal. I don't like
1:02:58
their default home screen. I want to fit more eye
1:03:00
icons on it. I want to customize my icons.
1:03:03
I want to change the name. I want to show
1:03:05
labels on my applications in the
1:03:07
doc. I don't want truncated names.
1:03:10
So I talk about options
1:03:13
for custom launchers. I
1:03:15
talk about long chair two a bit,
1:03:18
which is it's
1:03:20
no longer maintained. It's now being taken
1:03:22
over. It's now a launcher twelve, I believe, but it's
1:03:24
an alpha. It's not ready for
1:03:26
widespread use. So I'm still using launch
1:03:29
chair to and
1:03:31
I'm using the version from Aurora
1:03:34
Store, not the lawn chair version in f
1:03:36
drawer, which is even more outdated. I talk
1:03:38
a lot about the confusion there, but I like
1:03:40
long chair two as
1:03:42
my custom home screen. It
1:03:45
allows me to really change the way it looks.
1:03:47
I give examples, but it allows me to
1:03:49
control my icons. It allows me to control my labeling.
1:03:51
It allows me to control how many I can have on my
1:03:53
screen. That's important to me. It
1:03:55
might not be important to you, but it's really important
1:03:58
to my OSINT. So that's something to
1:04:00
consider. I also talk about how
1:04:02
to create a screen on your device,
1:04:05
which you can swipe to, which has all
1:04:07
of your phone numbers visible. Because if you
1:04:09
are like me and you've got twenty five VoIP numbers
1:04:11
used for different things. And then the dentist
1:04:13
asks you, hey, what's your phone number?
1:04:16
I can't spot that off. I don't have them
1:04:18
all memorized, so I have sheet sheets
1:04:20
on my phone. I do that by downloading
1:04:22
simple notes, making the note
1:04:24
and putting a widget on my
1:04:27
home screen to the right, which I can swipe to and
1:04:29
see whatever number I need right away. Let's
1:04:31
talk profiles. Your graphene OS
1:04:33
device allows you to have multiple
1:04:35
profiles This allows you to boot
1:04:37
into different instances so to
1:04:39
speak of your device, and you can have
1:04:41
applications in one profile which are not available
1:04:44
in the other profile and vice versa.
1:04:46
This has been official. When you have
1:04:48
an application which is kinda
1:04:50
dirty, maybe you need Google Maps.
1:04:52
You've gotta have Google Maps. I respect that.
1:04:55
I don't want that in my home profile,
1:04:58
but if I had to have it, I'd probably put it
1:05:00
in a secondary profile so you could
1:05:03
do that. Also, you
1:05:05
could have a secondary profile. And
1:05:07
in that profile, maybe you have enabled Google
1:05:09
Push services and you have Google Maps and
1:05:11
all those things you need. And then ninety
1:05:13
nine percent of the time, you are not booted into
1:05:16
that profile, instead you are booted into your home
1:05:18
profile. But when you need those services,
1:05:20
you could always go to them without dirtying
1:05:23
up your entire device. Full disclosure,
1:05:25
I do not use profiles. I don't need
1:05:27
them. They're fun. They're
1:05:30
neat. I just don't need
1:05:32
it. And for me, it's more about
1:05:34
simplicity and reducing
1:05:36
complication. But if you want
1:05:38
profiles, of course, you can look at that too.
1:05:41
Chapter thirteen, maintenance and troubleshooting. It
1:05:43
really just goes over updating your device,
1:05:45
battery drain issues, backup issues.
1:05:47
How do you deal with your photos? How do you deal with
1:05:49
notifications? Again, we've talked about that
1:05:52
lot already, but I tried to spell
1:05:54
out the things you're going to most commonly
1:05:56
have problems with. If I'm going fast
1:05:58
here, it's because we have exceeded. Our
1:06:01
our mark for the week. Chapter
1:06:03
fourteen, daily usage, best practices.
1:06:06
Again, things we talk about a lot in the show. I just
1:06:08
get more into faraday bags which
1:06:10
we've talked about recently, proper
1:06:12
usage of your device. One thing I have changed
1:06:14
my tune a bit on is the secondary
1:06:17
device. Years
1:06:19
past, I talked about having
1:06:21
a secondary device, but the reason was
1:06:24
I was relying on an iPhone mostly.
1:06:26
I was relying on an iPhone while I traveled and
1:06:28
I was relying on an iPhone or an actually an iPad
1:06:30
touch in my home. I don't want to
1:06:33
knock down this concept ahead of having
1:06:35
two devices, one, which connects to cellular towers
1:06:37
while you're out. And one which you use in your home
1:06:40
which never connects to a cellular tower to have that
1:06:42
isolation, but I don't do that anymore.
1:06:44
And the reason is I trust graphing
1:06:46
OS. If you can be
1:06:48
disciplined enough to
1:06:51
turn off your microphone, turn off
1:06:53
your cameras through the software
1:06:55
and graphics OS, and disconnect
1:06:58
your cellular connection before you get
1:07:00
home. I see no
1:07:02
reason to have a secondary mobile device
1:07:04
in the house. What I do,
1:07:07
at the same spot, when I used to drop
1:07:09
my phone into a Faraday bag before I get to my
1:07:11
house, I turn off my camera, turn off my microphone,
1:07:13
and go into airplane I do that real quickly for my
1:07:15
quick menu, and then I go home. And
1:07:18
when I get home, I connect to my WiFi.
1:07:20
I'm okay with that. Only because
1:07:22
I'm on graphics device. I would never do that
1:07:24
on a an Apple iOS device.
1:07:26
I would never do that on a stock Android device,
1:07:29
but I will do it on a custom ungoogled
1:07:31
Android device. And I think
1:07:34
that that eliminates a lot of the issue I
1:07:36
hear people saying about the complications with
1:07:38
having two devices. I don't know
1:07:40
that we need that anymore. If you're using
1:07:42
iOS, I think there's a very valid reason
1:07:44
to have that. Every time you reboot an iOS after
1:07:46
an update, it turns on your cellular connection,
1:07:48
turns on your Bluetooth, it It screams to
1:07:50
the world, hey, here I am. Where are you? And
1:07:53
you can't do much about that. Over the past
1:07:55
two years, I've updated my Graphino's
1:07:57
device numerous times, which involved
1:08:00
a reboot and not one time
1:08:02
did it disable airplane mode
1:08:04
due to a reboot. So I trust it more than
1:08:06
I do iOS devices. There's still
1:08:09
cases for everyday bags in
1:08:11
our life. There's still reasons to have
1:08:13
them, but I no
1:08:16
longer push my clients to the dual
1:08:18
device lifestyle and just have one device
1:08:20
in the house and one device out. It's
1:08:22
up to you on whether or not are
1:08:25
you that disciplined to do it right? And
1:08:27
I talk in the book about that in a bit more
1:08:29
detail, but I just want people to
1:08:31
know that if you're going to do that, great. Just
1:08:33
make sure you're doing it right. Make sure that you're
1:08:35
doing it right for your situation,
1:08:38
not anyone else's. Let's fast forward.
1:08:40
Chapter fifteen reset and reversal. It just
1:08:42
walks you through, let's say, you bought that
1:08:44
Pixel. You hate graphene OS, or maybe
1:08:46
you're going to resell it. You you you bought a new one and
1:08:48
you wanna sell this old one. Well, you need to wipe all that
1:08:50
stuff out. And doing a a reset
1:08:52
on your GraphinOS device just resets GraphinOS.
1:08:55
So that chapter just walks you through. Here's how to
1:08:57
get that stock pixel android
1:09:01
stuff back on your device so you can resell
1:09:03
it or whatever. Again, nothing
1:09:06
special there. You can get those instructions
1:09:08
on the Graphiness website. You don't need me for that. Chapter
1:09:10
sixteen is Apple iOS considerations, and
1:09:12
it's basically for Everyone's
1:09:14
still reading who's decided, I'm not
1:09:16
going to use an Android phone. I'm going
1:09:18
to use an iPhone. Fine. No
1:09:20
judgment. At least do this.
1:09:22
And I walk through all the settings that
1:09:25
I recommend on existing and new
1:09:27
iPhone devices to make sure you're at least as private
1:09:29
as you can be. Since this
1:09:31
show is more about making a truly
1:09:33
private and secure device using something
1:09:35
like graphene OS, I won't go through all those.
1:09:38
Also, It's a hundred and thirty five
1:09:40
page book with sixty thousand words. I can't
1:09:42
fit it all into a show and also
1:09:44
I want to provide some value to the people who are
1:09:46
actually going to buy it. Speaking of
1:09:48
that, if you think
1:09:50
any of this is interesting, if you want
1:09:53
to create your own graphene OS device,
1:09:55
if you want to dive in and do it the right way,
1:09:58
please check out our digital guide. It's fifteen
1:10:00
bucks and that includes updates.
1:10:02
So when we need to change something, you will get notice
1:10:05
to update. That being
1:10:07
said, you have to give me some type
1:10:09
of email address where I can send those updates.
1:10:11
It should be a masked email address.
1:10:14
It should be a forwarding email address.
1:10:16
It should be something that I can't search
1:10:18
about you and get all of your information. It
1:10:21
should be something that you designate to this
1:10:23
purpose. We talked about that a lot. Simple login
1:10:25
offers a free plan that'll give you masked
1:10:27
email addresses. The important thing is whatever
1:10:30
you decide to use, just make sure you have access to
1:10:32
it in the future because I'm confident
1:10:34
this book will need
1:10:36
updated and it will get updated often.
1:10:39
When it does, I want you to get the free updates
1:10:41
so that you have that and you can see
1:10:43
what's changed. Obviously, this book
1:10:45
is going to be pirated. It it's probably pirated
1:10:48
already. I don't care. Not worried
1:10:50
about that. It wasn't the piracy that that bothered
1:10:52
me with digital books It was the counterfeiting
1:10:55
that we had to constantly battle on places
1:10:57
like Amazon. We're not offering this
1:10:59
as a print book, so we don't have to we don't have to
1:11:01
really deal with that as much. So of course, it'll
1:11:03
get pirated, and you could download pirated version,
1:11:05
but you don't get the updates. And
1:11:07
the pirated version might be ten editions old
1:11:10
by the time you hear this. Who knows? So
1:11:12
what we're trying to do is provide value to people who
1:11:14
actually support the show. If you wanna support the show,
1:11:16
buy an ebook, hopefully it provides some value
1:11:18
to you. But we want to also say
1:11:20
Thank you for not pirating it. So therefore, we're
1:11:22
going to give you free updates every time we have
1:11:25
something to add to this. And we want to apply that to
1:11:27
whatever books we do in the future. If we do a
1:11:29
book just on complete
1:11:31
disappearance kit. Okay. Well, if you buy that book, you
1:11:33
should get all the updates for that topic.
1:11:35
That's the business model I want to switch
1:11:38
to because that takes me out of Amazon.
1:11:40
And that's really where I wanna be. Wow. Okay.
1:11:42
This show way too long.
1:11:45
Hopefully, you got something out of it and maybe you got
1:11:47
some ideas of what you wanna do. My
1:11:49
true goal is it encourages
1:11:51
you take the leap. You don't have
1:11:54
to be stuck with iOS. I think you'd be surprised
1:11:56
if you can just devote thirty days to
1:11:58
an ungoogled operating system such as Graph
1:12:00
OS on a secure and clean device,
1:12:03
I think you'll forget all those things
1:12:05
you thought you needed from Apple. I
1:12:07
think you'll like this better. think it'll feel
1:12:09
cleaner. I think it will feel like
1:12:11
you're not sharing as much information. It might
1:12:13
even feel faster. If you're ready to jump
1:12:15
in, please go check out our new ebook.
1:12:18
It walks you through every single step
1:12:20
of the process. Alright. Thank you.
1:12:22
Now I get to go disappear myself.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More