Podchaser Logo
Home
290-Extreme Privacy: Mobile Devices

290-Extreme Privacy: Mobile Devices

Released Monday, 20th February 2023
Good episode? Give it some love!
290-Extreme Privacy: Mobile Devices

290-Extreme Privacy: Mobile Devices

290-Extreme Privacy: Mobile Devices

290-Extreme Privacy: Mobile Devices

Monday, 20th February 2023
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

In regard to privacy and security, I believe

0:02

our mobile devices are the most

0:04

important things in our digital lives

0:06

which we need to protect. They are

0:08

the most likely to be lost or

0:10

stolen, but I try to look at a bigger

0:12

picture. Every mobile

0:14

device is a tracking device.

0:17

It's a tracking device which we purchase

0:20

with our own money and then we carry it

0:22

around everywhere and then we

0:24

pay for monthly service in order

0:26

to connect to a cellular network and then

0:28

we allow that cellular network to

0:31

constantly document our location

0:33

and document all of the activities

0:36

and communications which we use on their

0:38

network. If that weren't bad enough, we

0:40

then allow Google or Apple

0:42

or whatever you use to then

0:44

collect all the data that they

0:46

can see, which they can tie

0:48

to our profiles. We pay a lot

0:51

of money to all these different services

0:53

but then allow them to

0:55

profit off of our usage of

0:57

their networks, devices, and digital

0:59

products All of this data which we

1:02

volunteer to them can then be used

1:04

against us. We've heard about

1:06

geo fence warrants where you can get

1:08

caught up into a Dragonet involving

1:10

a crime, which you had nothing to do with.

1:12

We have subpoenas, even civil

1:14

subpoenas, which can immediately uncover

1:16

all the different things you do on your devices include

1:19

that in part of some type of civil litigation.

1:21

There's the occasional bad employee at

1:24

any of these services, which

1:26

will abuse their power to collect our data

1:28

and give it to people who don't need it. And of course,

1:30

we have the inevitable breach or

1:32

leak or whatever, That's going

1:34

to expose everything we've done anyway. Why

1:37

do we allow all these companies

1:40

to collect all that data, use it

1:42

to their benefit, and then send us the

1:44

bill. We have the ability to

1:46

make our mobile devices not only

1:48

secure but also private. Most

1:50

of us just don't do anything about

1:52

it. We can prevent most

1:54

leakage of this information, which

1:56

could be used against us in the future.

1:59

It just takes more effort. Google,

2:02

Apple, all these things are very convenient,

2:04

but they are also very invasive.

2:07

Today's show is all about mobile devices.

2:09

Mobile device privacy and security. What

2:12

what we can and what we can't do to

2:14

take ourselves out of this system of

2:16

tracking everything we do. We're

2:18

going to talk about many steps which

2:20

you can take today to eliminate many

2:23

of the headaches you will have in

2:25

the future. Let's start over

2:27

and let's secure our mobile devices

2:30

together. You

2:38

are listening to the Privacy Security OSINT show

2:40

episode 290 released on

2:42

February twentieth of twenty twenty

2:44

two. In this episode, I release our first

2:47

digital guide as part of our new Extreme

2:49

Privacy Series to vote the bulk

2:51

of the show to mobile device privacy and

2:53

security and offer some OSINT updates.

2:56

Direct support for this podcast comes from

2:58

our services training and my

3:00

new books for twenty twenty three OSINT

3:02

techniques, tenth edition, and extreme

3:04

privacy, mobile devices, digital

3:07

edition, more details can be found at inteltechniques

3:10

dot com or within these show notes.

3:13

Welcome back everyone. This is an odd show

3:15

because I'm releasing it on a Monday. Typically,

3:17

I release my shows on Fridays, but something

3:19

has come up. And starting in about four

3:21

hours, I am going to be off radar for an

3:23

unknown amount of time, so I wanted to get

3:25

this out sooner rather than later,

3:28

so here it is. Before we get into

3:30

the main topic, let's go through some OSINT

3:32

stuff because I do have several ossent updates,

3:34

which I think are quite important. For

3:37

people using the latest

3:39

tenth edition of the OSINT Technik's book

3:41

and you have a Mac computer

3:44

with an m one or an m two Apple

3:46

processor in it, you may have

3:48

noticed a problem recently with

3:50

the latest edition of Ubuntu. Obanto

3:54

in the book when I was making that book was

3:56

version twenty two dot o four dot o

3:58

one LTS for long term support.

4:01

And it works fine. There's no issues there.

4:03

Several people have contacted

4:05

me to say that the latest version

4:07

of Ubuntu OSINT two dot o four dot

4:10

o two LTS is causing them

4:12

issues. What people are reporting

4:14

is that specific recent

4:16

version of Ubuntu on a Mac

4:19

machine with an m one or an m two processor using

4:21

UTM as virtual machine software doesn't

4:24

boot. It just gives them a black screen.

4:26

This only applies to people who are,

4:29

a, making a new a Ubuntu virtual

4:31

machine. B, they're using a

4:33

Mac computer c, you

4:35

have the m one or m two processor and

4:38

d, you are using UTM, which by the

4:40

way are all great things. I recommend that. If

4:42

you are having this problem where you get the black screen

4:45

while installing Ubuntu, just go back to version

4:47

twenty two dot o four dot 01I

4:49

will put a direct download link in

4:51

the notes, which will download that specific ISO.

4:54

But again, that only applies to

4:56

people under those circumstances. Everyone else,

4:58

this probably means nothing. Next, numerous

5:00

people reporting that what's my name is not

5:02

working within the Ubuntu

5:04

build, and I was able to replicate this and

5:06

confirm this. This is something that seems

5:08

to be happening more often with

5:10

that application. When I was writing

5:13

the tenth edition of the OSINT book,

5:15

I had used what's my name in the ninth

5:17

edition, but I was having difficulty with

5:19

it with the tenth edition as well, which is

5:21

why I tried to introduce better

5:24

alternatives to that And

5:26

I think now that it's not working, we need

5:28

to really embrace those other options. My

5:30

preferred username Linux

5:33

lookup tool right now is Meg gray.

5:35

That is MAIGRET.

5:38

It is a fork of Sherlock which

5:40

is a staple which has been around for a long time, but

5:42

it adds numerous additional sites.

5:45

If you are using the tenth edition of the book and

5:47

you have the LinuxVM made,

5:50

you already have a username script and in

5:52

that script is May grey and it already

5:54

is configured to query all

5:56

twenty eight hundred sites that it

5:58

can query looking for a target

6:00

username on those websites. None

6:02

of those username search tools are perfect.

6:05

They all give you false positives. I

6:07

typically may gray can be a little

6:09

bit better, but if you're noticing that what's my

6:11

name just doesn't work anymore, it's it's it's

6:13

not just you, it's not just the script. It's

6:16

the the program itself. And

6:18

again, I'm recommending May Grey as an alternative

6:21

for that. Next, I added

6:23

a new option in the domain names

6:25

search tool on intel techniques dot com.

6:28

I added webscout, and that's webscout.

6:31

Io. It's a domain lookup

6:33

tool and it it's a very pretty

6:35

tool. It doesn't do a whole lot, but one thing

6:37

it does has helped me recently.

6:40

When you put in a target domain name,

6:42

it tries to conduct a query through a third

6:44

party API for any email addresses

6:47

involved in a breach at that domain.

6:49

Now that's never going to be complete, not

6:51

even close to complete, but what

6:54

it helped me do the other day was put

6:56

in a domain name and identify the

6:58

CEO's email address, which was not

7:00

a standard format like first name dot last name

7:03

or first initial last name It was something

7:05

a bit unique because the CEO probably

7:07

doesn't want a bunch of email. That helped me

7:09

identify the proper email to contact

7:11

the CEO of a company because That

7:14

person's email appeared in some data breach

7:16

and now this third party service was the only

7:18

domain research tool which presented

7:20

me an email address of my target.

7:23

So I'm adding it to the domain name tools.

7:25

You can go get that under the tools tab

7:27

over to inteltechniques dot com. Click on domains.

7:29

And you can use that or you can also do it

7:32

manually if you want to do a search on

7:34

that site. Again, not

7:36

anything too groundbreaking there,

7:39

but it was the only service which gave

7:41

me that one piece of information which I

7:43

needed and so we should always have

7:45

those. That domain tool is getting

7:47

quite long. But there's some good

7:49

stuff in it. Alright. Let's get into the main topic

7:51

of the show, which is mobile devices. This is

7:53

a show I've been teasing for a few weeks

7:55

now. And I'm going to

7:57

do my best to not

7:59

make this sound like an NPR

8:02

fundraiser show. Yes, I'm going

8:04

to promote the PDF we just released,

8:06

but I'm also going to give out a lot of

8:08

information from that PDF, which I think could

8:10

be helpful to people who are trying to

8:12

create a secure and private mobile

8:14

device. Let's recap just a little

8:17

bit. On the last show, I

8:19

stated that we would be releasing the mobile

8:21

devices PDF during

8:23

this show, which we are doing right now. I

8:25

stated that we had decided that we

8:27

would not be releasing a fifth

8:30

edition of Extreme Privacy this

8:33

year, and that brought up several conversations

8:35

of a, what's

8:37

the one thing that we would really drastically

8:40

change if we were writing a new book? And

8:42

b, what's the one service

8:44

we offer which people request

8:46

more than anything else, but then they either can't

8:48

afford it or don't come back to hire us

8:50

for that service. And that The

8:53

answer to both, by far is mobile

8:55

devices. There's a lot that's changed

8:57

since we wrote the fourth edition 290Extreme

8:59

privacy in regard to mobile devices, and

9:02

we hear from people every single day. Numerous

9:04

people every day saying, I need

9:06

help with a secure mobile device.

9:09

Most of them don't know that they want Android

9:11

or iPhone. They don't know that they need

9:13

a custom operating system. They don't have the details.

9:16

They just know that they need it

9:18

because either they have a problem or

9:20

they are realizing just how much of

9:22

their life they are giving up by using

9:25

these standard stock devices which we all

9:27

have been trained to use. So

9:29

that's why we got here. We decided,

9:31

well, we're not going to do another version

9:33

290Extreme Privacy as far as the fifth edition

9:36

this year. So we wanna do something what

9:38

if we tried to create a

9:40

smaller book, a more focused, a more

9:42

detailed book on one single topic,

9:44

which we could really dive deep

9:47

into, not worry about page limitations,

9:49

not worry about fitting it all into one chapter.

9:51

How do we do that and provide

9:53

it in an affordable way, in a

9:55

way that everyone can access it, and that's how

9:58

we decided, let's try a digital

10:00

edition. And that's what we've done. We have created

10:02

a single PDF file. It is

10:04

hundred and thirty five pages at eight and a half by eleven

10:07

full size paper and it has

10:09

sixteen CHAP which goes into

10:12

every facet, every

10:14

way that we build custom

10:16

devices for our clients. By putting

10:19

out a digital version, we really didn't

10:21

have to worry about any limitations. File

10:23

size doesn't matter. Page count doesn't

10:25

matter. We can go as deep into this as we

10:27

want and not have to worry about cutting

10:30

anything to make the

10:32

final book that we wanna make. So this is what we've

10:34

done. It is out right now. I will put

10:36

link in the show notes. We'll talk about it a lot

10:38

throughout this episode, but I want people

10:40

to know that it is available. The biggest

10:42

question, of course, is how much is it?

10:45

Fifteen bucks, and that purchase

10:47

also gets you updates. And that's, I

10:50

think, the big deal here. As I said last week,

10:52

this is not a buy it and we'll

10:54

talk to you next year and sell you something new.

10:56

It's a buy at once and anything we need

10:58

to change, anything we need to update, anything we need

11:00

to add, anything we need to remove, we can

11:02

do that and then just send out an email

11:04

blast to say, hey, new edition out.

11:06

Here's what's changed. If you want that, go get it.

11:09

This way, once you're in, you have

11:11

those updates without needing to buy

11:13

anything in the future. We actually released

11:15

this last week, but we did a

11:17

kind of a quiet release. I announced it on my blog

11:20

which a lot of people do follow because the podcast

11:22

is also fed to the blog, and

11:24

sales have been strong. I'm I'm

11:26

very happy with that. What I'm

11:28

more thrilled with though is

11:32

the names and the email addresses

11:34

being provided by the people buying

11:36

this extreme privacy book, easily,

11:39

at least ninety percent

11:41

of the sales are using either

11:43

masked or some type of

11:46

privacy related email addresses. I'm

11:48

seeing very few people use their true

11:51

email addresses that Gmail or that corporate

11:53

account and those who are doing that probably

11:55

aren't only doing that because they have to in order to get

11:57

reimbursed by their employer or something like that.

11:59

So I'm thrilled to

12:01

just see so many people using

12:04

alias or at least masked

12:06

information even from me that

12:08

that makes me so happy. It's also fun

12:10

to see the names. We we have to

12:12

ask for a name and email address and credit

12:15

card information because that's what our distributor requires

12:17

us to do. I don't care what name you put on there

12:19

as long as this charge through. doesn't matter to me.

12:21

I don't care what email address you provide as long

12:23

as it's a way to get a hold of you so that you can get

12:25

the updates. I don't even know your true

12:27

corporate or personal email address it's

12:29

great to see people using alias information.

12:32

The number one purchaser used

12:34

so far is John Doe followed by

12:36

my name, which just kind of creepy to see

12:38

come in. So kudos to all the people who are

12:40

taking their privacy seriously and

12:42

using that type of information. Several people

12:45

are already asking, will the current print books

12:47

on Amazon and the answer is yes. The tenth

12:49

edition of OSINT techniques and the fourth

12:51

edition 290Extreme They're still out there.

12:53

They're not going anywhere. We're just not doing anything else

12:55

with them. In an ideal world,

12:58

this will allow us to leave the Amazon

13:00

ecosystem and possibly move to this

13:02

new format for all future stuff.

13:05

The fifteen dollar charge for

13:07

the ebook covers everything

13:09

including the distribution, the credit card fees, etcetera.

13:11

And none of that goes to Amazon,

13:14

none of it requires any type of account to

13:16

be created. We are using our own

13:18

Stripe account for the purchases, so

13:20

your credit card information is only going straight

13:22

to Stripe. We don't even store that and

13:24

we cannot see your credit card details. You

13:27

can find many more details about this on my website

13:29

inteltechniques dot com, click on the books tab, scroll

13:31

to the bottom, you'll see the new option there.

13:33

And then the question comes, well, what's

13:36

next? We introduced this idea

13:38

of, could we do a series

13:41

of books on extreme privacy, digital

13:44

only, more affordable, and more

13:46

in-depth. I think that's a really good possibility.

13:48

We have to see how this goes first. I

13:50

wanted to do a book on our

13:52

brand new second

13:55

passport option, which is

13:57

a fast track option we've worked

13:59

out, which also includes an

14:02

optional foreign name change,

14:04

which does not reflect a US

14:06

name change, but my staff

14:08

says that would be such a

14:10

small niche community of people

14:12

who would be interested in that. And that might be

14:14

a waste of our resources. So we are probably

14:16

not going to do that. What my staff

14:19

brought up is if this works

14:21

out and if it's the new way we want to

14:23

do this. Let's start with ebooks on each

14:25

service we provide. So for example, the next two

14:27

ebooks could be the disappearance

14:30

kit or the dev kit. Let's walk

14:32

through the entire process of everything

14:34

we do, which I think would help a lot of people

14:36

who can't afford to hire us to do it for

14:38

them. Now, of course, my concern came up with,

14:40

well, wait, why would we put out a guide,

14:42

a detailed step by step guide on

14:45

how to do every service we offer, won't that kill

14:47

our business? And my staff immediately responded

14:49

with the people who hire us to

14:51

do this for them don't care that

14:53

there's a do it yourself guide out there for fifteen

14:56

dollars. They're hiring fessionals to do it because

14:58

they want it done a specific way, or they just

15:00

don't wanna do them do it themselves, which I completely

15:03

respect. And I think that That

15:05

makes sense. All that will depend on how this

15:07

goes. So if you are interested

15:09

in what we're talking about in this show and

15:11

all the details, please go check out the extreme

15:13

privacy, mobile devices, ebook.

15:15

And finally, lot of people contact us

15:17

and ask us how they can support the show. How can we

15:19

send two dollars a month to the show? Do you have a

15:21

Patreon or something like that? And we

15:23

don't. I don't like the Patreon style.

15:25

It's just not my thing. I don't like asking for

15:28

donations. That's not my style either.

15:30

So if you truly want to just support this

15:32

show, but we don't have a way for you

15:34

to do that, buy an ebook. That

15:37

works great for us. It's less money than

15:39

you would spend trying to do a Patreon

15:41

to support a show, but more importantly,

15:44

you get something out of it. I don't want to

15:46

just ask for donations to make this dumb

15:48

little podcast, I'd rather make a product

15:50

that I think you might like and that you might be able

15:52

to use and then sell you that for little

15:54

amount and let that support the show

15:56

and not ads. Or sponsors or

15:58

donations. Alright. My spiel is

16:00

over. Let's get into the main topic, which is

16:02

mobile devices. Let's start over.

16:05

Let's don't make any assumptions of anything

16:07

we knew before this show. Maybe lot

16:09

of you already have a private secure mobile device

16:11

and a lot of this is already known to you. That's okay.

16:14

Bear with us. Maybe there'll be something in there

16:16

which does send you to something

16:18

new you can research. My plan for

16:20

this show is to just go

16:22

through the book, not everything, not

16:25

every step, not all the technical details.

16:27

Let's go through the main topics throughout

16:29

the entire book, which will help

16:31

us maybe guide us into

16:33

what we care most about when

16:35

it comes to our mobile devices. Now

16:38

in the introduction, I already laid out,

16:40

I think, why we care. Frankly, I

16:42

don't think anyone's listening to this show who doesn't

16:44

care, but we are carrying

16:46

around tracking devices in our pocket.

16:48

Tracking devices which we bought with our own money

16:51

services which we buy and then we allow

16:53

all these different services and companies and whatever

16:56

to monitor what we do and

16:58

then use that to make more profits.

17:01

I don't like that business model, so I

17:03

do what I can to mock up those

17:05

results so that they don't really impact

17:07

me. That's the whole idea of this.

17:09

There have been several clients who have hired us to

17:11

help them make private and secure devices,

17:14

but we're not doing anything

17:16

special that you can't do

17:18

We are just other human beings using

17:20

the same services and same technologies and

17:22

same free software out there which you can use,

17:24

which is again part of the motivation to

17:27

make this book. Anyone can

17:29

make themselves a completely private and secure

17:31

device with completely private and secure

17:33

cellular access. If you just

17:36

put the time into it. I will put a link to

17:38

the book and show notes, but let's jump

17:40

into it in order to get some

17:42

actual actionable items

17:45

out of it. Chapter one of the book

17:47

is device selection. Now the

17:49

first two chapters of this book, a

17:51

lot of people might say they're not really needed.

17:53

And I I can kind of agree with you on that.

17:55

The first two chapters go into device selection

17:58

and OS installation. It's no surprise.

18:01

I like graphene OS. And when my

18:03

clients need a private and secure device, I

18:05

want them to have a graphene OS Android

18:07

device. So this book

18:09

is not just here's

18:11

how to install Graphina Less. You don't

18:13

need me for that. Their website does a much better

18:15

job at that. But the first two chapters

18:17

get into how should we pick device and

18:19

how should we install our custom operating system

18:21

on it. Now, let's start with picking a device.

18:24

I am a firm believer that if you want

18:26

a truly private and secure

18:28

mobile device, you have to get new hardware

18:30

because whatever hardware you're using which

18:33

has that cellular account in your true name or

18:35

you've done a bunch of stuff in your true name, whatever

18:37

it might be. It's dirty. It's

18:39

tainted. It's infected with

18:42

you. So getting a new device

18:45

resets that clock and allows us to set everything

18:47

up right so that we don't have that

18:49

contamination. Now, could you wipe

18:51

out your iOS device or your Android device

18:53

and start over, of course, but you

18:55

never get a clean slate. Apple,

18:57

Google, etcetera are always collecting unique

19:00

hardware identifiers on their stock equipment.

19:02

There's not a whole lot you can do about that.

19:05

In the book, I have the Apple versus Google

19:07

discussion very quickly.

19:09

It very right up front. In

19:11

my opinion, there is no such thing

19:13

as a private Apple iOS

19:16

device. Apple is collecting constant

19:18

telemetry from your usage. They

19:20

are pushing you to use their iCloud system.

19:23

That is storing your data on their cloud,

19:25

probably most of it's not encrypted. And

19:28

worse, they require you to

19:30

have an Apple ID with them

19:32

connected to your device in order to download

19:34

any apps and use the phone the way it's intended

19:37

to be used. You it's

19:39

extremely difficult. To use an iOS

19:41

device without an Apple ID, not

19:43

impossible, but almost. In

19:45

past shows, I have requested my data

19:47

from Apple and I was shocked to learn what

19:50

they were storing. I was shocked that they were

19:52

monitoring the last podcast I listened

19:54

to and how far got into it and when I quit

19:56

stopped, or when I stopped listening to it, they're

19:58

storing all of that. By forcing you to have

20:00

an Apple ID on your mobile device

20:02

that allows them to store all the information

20:04

about you in the way you use that device

20:07

in their network. Now, of course, they say they don't

20:09

share that, they don't sell it. Okay.

20:11

That could be true, but you're collecting it

20:13

which always leads to a problem whether

20:15

through a breach or through a real employee

20:18

or something else. The simple

20:20

matter to me is, I

20:22

don't feel I should have to create

20:24

some type of online account through a big

20:26

conglomerate such as Apple or Google just

20:29

in order to use device, which

20:31

I paid for. Because of this, Apple

20:34

is out for me. I will not use an iOS product

20:36

and I encourage my clients to do the same.

20:38

That leaves us with Google. Stock

20:41

Android devices are really no better.

20:43

You don't have to have a Google account to use

20:45

them, but you do if you wanna download apps from

20:47

the Google Play Store, Google is

20:49

going to collect a lot of your information. It's

20:52

going to collect it at the base of that

20:54

operating system, and it's going to send data

20:56

to Google constantly without

20:59

you really understanding what they're doing

21:01

in the background. Therefore, I believe

21:03

the only viable option for us

21:05

for those enthusiasts who want to go to

21:07

the extreme is Grafting OS.

21:09

Grafting OS is an open source operating

21:11

system. It is based on Android, but it is focused

21:14

on privacy and security. I

21:16

prefer it for several reasons. One,

21:18

it's just minimalistic. It's

21:21

simple. It's a very hardened

21:23

but very minimal operating

21:26

system. That's important to me. I don't want a bunch

21:28

of junk. I don't want a bunch of stuff

21:30

that I can't remove, I just want

21:32

the necessities and let me take over

21:34

from there. Every decision about graphene

21:36

OS is based on private use security, mostly

21:39

around security, but also privacy. So you have a lot

21:41

of options on the graphene OS devices,

21:43

which you don't have on stock android devices.

21:46

The biggest reason I like graphene

21:48

a less better than all the other custom

21:50

android operating systems, it's

21:53

the updates. Every week, I'm getting an

21:55

update from Graph OS from their servers,

21:57

which is patching up phone abilities, it's

21:59

adding new features, repairing features, fixing

22:01

minor bugs, I don't get that

22:04

kind of update from Apple or Google. I only

22:06

get it from GraphinoS. I will go as far as

22:08

to say, I don't know of any

22:10

other custom operating system

22:12

for any mobile device or any

22:15

stock operating system of any mobile device,

22:17

which issues updates as fast as graphene

22:20

OS. Really important to me. This is where

22:22

I'm going to offend a lot of people. They're going

22:24

to say that I should be looking at other operating systems

22:26

I have. I think I've looked at all of them. I

22:28

like graphene OS the best. And

22:30

I think it is the cleanest most minimal

22:33

option we have to start our

22:35

private and secure device. Therefore, chapter

22:37

one of the book gets into device selection, you're going

22:39

to need a new device. Currently, I

22:41

only recommend people buy either the Google

22:44

Pixel six, six

22:46

pro 6A7

22:48

or seven pro. Graphite OS

22:51

requires a Google

22:53

Pixel device because of the

22:55

way that we can get into it, unlock

22:57

the boot loader. We can clear out

22:59

all the Google junk from it. We can then install

23:02

our own operating system and relock that boot

23:04

loader in a way that you can't do with

23:06

say a Samsung or something else.

23:08

Also, Google Pixel devices are

23:11

the most universal for practically any

23:13

other custom operating system you want to try.

23:15

If you don't like Graph OS and you want to try

23:17

a different operating system, it

23:20

very likely will work with a Google Pixel

23:22

device when it might not work with that

23:24

that one note that you bought two years ago.

23:26

So I only recommend those five devices

23:29

because we can install graphene OS on

23:31

them. Now the four a and

23:33

the five, those would work

23:35

too, but they

23:37

stop getting updates from Google

23:39

at the end of this year, which means they're probably not

23:41

going to be supported by graphing OS

23:44

more than maybe the end of this year or

23:46

early next year. So If you're buying

23:48

a new device, I only recommend the five that I

23:50

mentioned because you have five years

23:52

of support from Google, which

23:54

translates to also having support from

23:56

graphene OS. If you get one of those five devices,

23:59

you're good for several years and you don't have to worry

24:01

about not getting those updates. Of

24:03

those five, I prefer the

24:05

Pixel six a. It

24:08

is the cheap model, but

24:10

I don't think that's quite fair. They are very

24:12

affordable. I bought a bunch of

24:14

six days during the holiday season when they

24:16

were on sale for two hundred ninety dollars.

24:18

The current retail price is four forty nine, but

24:20

I see them often for anywhere from three hundred to

24:23

three hundred dollars brand new, sometimes even

24:25

in store at places like Best Buy. You'll have

24:27

to do your research there. I like

24:29

the six a mostly because of size of

24:31

those five devices. It is the smallest

24:33

in size. I don't like these big

24:35

pop tart phones. I miss the

24:37

original SE size, that four point

24:39

seven inch screen or that four inch screen something

24:41

around there. I don't like these

24:43

six point four inch screens. The

24:46

Pixel 6a, I believe, is a six point one inch,

24:48

and it's not extremely big. It's bigger than I

24:50

like. But of the options I have, it's

24:52

the smallest one. If the Pixel

24:55

eight comes out at the end of the year and they are

24:57

they rumored to have a smaller device which might

24:59

happen, If that does happen, I would probably

25:01

go to that just for the size alone.

25:04

The six six Pro seven and seven Pro,

25:06

they have better insides than the six

25:08

a. But you pay a premium for that.

25:10

But here's my thing. We should not be using our

25:12

mobile phones as entertainment devices. We should

25:14

not be using them as gaming devices should

25:16

not be watching four k videos on them all

25:18

day. We should not be processing files

25:21

and photos on our devices. That's what computers

25:23

are for. If you are only going to

25:25

use your mobile device as a communications

25:27

device, the six a is

25:29

more than enough for resources to get

25:31

that done. So for me, The six a is

25:33

where it's at. That's what I use every day, and

25:36

it's the most affordable and smallest of those

25:38

devices. Now from there, the book gets

25:40

into in stalling, graphene OS. I'm not

25:42

going to waste your time with that here.

25:44

And you don't need me to tell you that anyway. I

25:46

I steal the instructions from their website. Just

25:49

go to their website, they can walk you through. The only

25:51

thing I do in book is I walk through the different

25:53

options and I I change things just

25:55

a little bit just on personal preference. But

25:57

it wouldn't matter much anyway. So let's move past

25:59

that and get to chapter three, which is device

26:02

configuration. A lot of this is personal

26:04

preference, but I talk a bit about how I prefer

26:06

to change my quick launch menu in graphene

26:09

OS. How I prefer to add the

26:11

microphone access and camera access

26:13

buttons to that for easy access, because

26:16

I can use software switches to disable

26:18

the microphone and all the cameras. This is

26:20

a huge benefit of graphene OS.

26:23

Yeah, we could put stickers on our phone, yeah,

26:25

we could put physical micros or

26:27

microphone blockers. And those

26:30

might work, and that might even be an extra layer.

26:32

But if you are disciplined enough to

26:34

use your phone correctly, graphene OS

26:36

gives you the option to disable your cameras

26:39

and microphones so that when any

26:41

application tries to use them, it has

26:43

to prompt you first and make sure you

26:45

are okay with that. I leave my microphone

26:47

and camera blocked all times am I graphing

26:50

OS? And when I need to turn it on, it'll prompt

26:52

me and say, hey, you've got a call coming in. Do you want to answer

26:54

this call? Do you want me to turn on your microphone? Yes or

26:56

no? I can make that call then.

26:58

I actually don't use physical

27:01

microphone and camera blockers much

27:03

anymore. I trust my device

27:05

and I trust the software more than

27:07

I would say an iOS device or a stock

27:10

Android device. So I walk through that a bit Basically

27:12

in this chapter, I'm just walking through some custom

27:14

changes. I've talked before about

27:16

I like to make my display monochrome when

27:19

I'm doing communications such as email or

27:21

messaging It takes some of that fun

27:23

away, but also think it takes some of that

27:25

temptation away from using my phone

27:27

as an entertainment device. I

27:29

walk through how I put a shortcut on my menu

27:31

bar for that to immediately turn it from full

27:33

color to monochrome. Again, personal

27:35

preferences here. Most people don't care about that.

27:37

I won't spend much time. But next, I

27:39

talk about browsers, and this is something that's

27:42

changed a lot for me. In previous

27:44

books, I talked about Firefox Focus,

27:46

great product, it's a mobile browser,

27:49

which allows you to immediately clear your

27:51

history when you exit it. It's got some nice

27:53

features in it. I actually don't use it

27:55

anymore. I now rely on

27:57

the vanadium web browser. That's

27:59

the default web browser included with Graphino

28:02

West. It is Chromium based, but

28:04

it does not send any data to

28:06

Google. My reasoning here is simply

28:08

that this option is

28:10

almost maybe even better

28:13

than Firefox focused. But more so,

28:15

it's I don't want multiple apps I need

28:17

to worry about. I don't want multiple layers of

28:19

potential vulnerability. If I just have one browser,

28:21

then I just have one thing to worry about and one

28:23

thing to keep updated. I also trust

28:26

the work that graphene OS has put into

28:28

it in order to make it as secure as possible.

28:31

Now, I do walk through the book on some additional

28:33

changes I make, and I won't go through all

28:35

those here. If you're interested, go check that out. But

28:37

basically, I do tweak

28:39

a few things which I think could be bit better,

28:42

but also that might not be best

28:44

for global audiences, I just think it's better for

28:46

this audience for those of us who are really

28:48

interested in this. So some modifications

28:51

there, slight then walk through some of the

28:53

camera settings I change, mostly just

28:56

eliminating the sounds. I don't want the shutter

28:58

sound to go off. That that can be embarrassing when you're

29:00

trying to get a photo and not

29:02

be seen doing it. I enabled the gyroscope

29:04

on the camera. So just some little

29:06

things like that. I talk about ring tones a bit.

29:09

Mostly because we don't want our phone

29:11

going off when we're trying to be discreet doing

29:13

something. From there, I talk

29:15

about contacts and how I maintain

29:17

contacts. The short story

29:20

here is I maintain my

29:22

immediate contacts within

29:25

the native contacts app

29:27

on Graphino West because I want all of

29:30

my communications devices to be able to

29:32

access that information. Everything from signal

29:34

to my pseudo or whatever, I don't

29:36

synchronize it to anything. I

29:38

keep all my contacts in the in

29:40

the native contacts app within Ubuntu,

29:43

and I can export them to AVCF

29:46

file from there and import them into my phone. So

29:48

nothing too crazy there. That's all some

29:50

pretty standard stuff. Let's get into chapter

29:52

four because this is where things I think actually

29:54

get important DNS configuration.

29:57

DNS is very important. We've talked about it

30:00

a lot. DNS is what takes a

30:02

domain name such as intel techniques dot

30:04

com and translates that to an IP

30:06

address so that when you go to intel techniques

30:08

dot com, your device knows to go to my

30:10

server IP address and grab my website.

30:12

DNS is extremely vital for

30:15

this whole Internet thing to function. By

30:17

default, the DNS provider

30:20

of a Graph OS device is whatever the

30:22

network is using. So if you are on

30:24

an AT and T network, then

30:26

your default DNS provider is AT and T.

30:28

They are doing your DNS queries for you.

30:31

If you're on your home WiFi, it's whatever your WiFi

30:33

is using. If you're using a stock Android

30:35

device, you're probably using Google as your

30:37

DNS. And sometimes even when

30:39

you have a VPN set up on your iOS

30:41

device, Apple's bypassing that and using

30:43

their own connection to get data. So

30:46

with graphing OS, we have actual

30:48

control of this by default. It's using

30:50

whatever your network uses, but we can

30:52

change that. In the book, I

30:55

talk specifically and I recommend next

30:57

DNS. I like this for two reasons.

31:00

One is it's a third

31:02

party DNS provider, which I trust. So

31:04

the queries are not being done by my Internet

31:06

service provider, who I know is going to abuse

31:08

them. It's being done by a privacy respecting

31:11

DNS provider. But that's not

31:13

the big reason I like them. There's

31:15

tons of privacy respecting DNS

31:18

providers. What I care about is filtering.

31:21

Fulfuring is where I can tell NextD

31:23

and S, hey, block

31:26

these one hundred thousand

31:28

known trackers, malicious

31:31

things, bots, ads,

31:33

etcetera, and don't let them ever

31:35

even come into my phone. Then when

31:37

I go to yahoo dot com and I load the page,

31:40

a lot of the junk doesn't load because next

31:42

DNS, my DNS provider isn't letting

31:44

that load. That's happening way

31:46

before an application would

31:48

be required on my device. Now,

31:50

in the past, I've talked about application

31:53

firewalls on a mobile device. I've

31:55

talked about block data on Android. I've

31:57

talked about lockdown on iOS.

32:00

I don't use any of those anymore. I

32:02

believe filtering by your DNS

32:04

is superior to an application based

32:07

solution. It requires less

32:09

overhead. It requires less layers to

32:11

go wrong, and it also doesn't conflict

32:13

with things like VPN applications, which

32:16

don't like it when you're trying to do a firewall in

32:18

a VPN at the same time. I have

32:20

no blockade a type

32:22

stuff on my mobile devices. I

32:24

use DNS to block it. The book gets

32:27

into a lot of detail about my exact settings.

32:29

I won't bore you with all that here. But

32:31

the more important thing is in the book, I'm able

32:33

to put lots of screenshots to say, while

32:35

you're configuring this, it should look like this.

32:38

Your should look like this. And if so, okay,

32:40

you're on the right track. Here's where you make that decision

32:42

on a, b and c. Default filtering

32:44

is great. But custom filtering

32:46

is where the real power is. And I

32:48

do some examples in the book to where I say, alright,

32:51

let's let's install an app, let's launch

32:53

that app, and let's monitor our

32:55

DNS requests, those DNS

32:57

queries coming out of our mobile device. That's

33:00

where we can see. Okay. That app has

33:03

some analytics stuff it's sending out.

33:05

That app has telemetry in it. Let's

33:07

block that. A lot of apps will

33:09

say don't don't

33:11

allow me to send statistics

33:14

out to my owner. Okay? They

33:16

often don't mean it. They still send stuff

33:18

out anyway. What we can do

33:20

with NextDNS is we can go in and say,

33:23

this application here uses Braze

33:25

to send analytical data their

33:27

headquarters. Let's block that connection because

33:30

it doesn't have anything. Head doesn't have any

33:32

impact on the usage. It doesn't restrict

33:34

me in any way. It's just sending data out that

33:36

I don't want them to have. So let's block that.

33:38

That entire chapter really gets into the

33:41

weeds of what to block, what not to block,

33:43

and I think that DNS

33:45

is probably one of the most vital

33:48

things that is overlooked by people

33:50

creating a private secure device. You

33:52

could have the most private and secure mobile device

33:54

ever invented on the planet and then go

33:56

to Facebook and let them start tracking what you're

33:58

doing and you've lost so much of that.

34:01

With DNS, we can say, don't

34:03

ever connect to any face book domains. I

34:05

don't want that, leave that out. Finally,

34:07

Next DNS allows us to disable the

34:09

login completely once we know everything is set

34:12

up the way we want it. Once you can see that everything's

34:14

running, you're not adding bunch of new stuff to your device,

34:16

you can turn that logging off completely so that

34:18

there's not this constant documentation of

34:20

every website or every domain that you're going to,

34:23

we can just disable that, which

34:25

you can't do with your ISP. Chapter

34:27

five gets into push services. I talked about

34:29

this bit the last couple of shows.

34:32

Push services allows us to

34:34

get notifications on our devices. That

34:36

typical Apple iOS or Google

34:38

device which you have is getting push

34:40

services through Apple or Google in

34:42

order to tell you, hey, you just got a text message.

34:44

Hey, you've got a VoIP call coming in. Hey, you've

34:46

got this alert over here. Now,

34:49

in the past 290Extreme Edition,

34:51

I was pretty strong on we

34:54

don't need this stuff. We If

34:56

you go this far to create an ungoogled

34:59

device, you don't need to introduce

35:01

Google back into the mix just so that you can know

35:03

every time someone texts you. From a

35:05

personal view, I still kind of

35:07

stand by that, but that's because I don't

35:09

need push services. I don't need

35:11

to be notified of incoming text messages or

35:14

emails. I check them when I can

35:16

check them and I don't want my phone buzzing,

35:18

dinging, ringing, etcetera, whenever

35:20

I'm not ready to check my communications. I

35:22

have adopted a pull lifestyle

35:25

instead of a push lifestyle. However,

35:27

that doesn't work for most of my clients.

35:30

And frankly, I I it shouldn't

35:32

work for most people. Let's if you're

35:34

if you have children in school and they need to

35:36

get a hold of you via tech or a phone call, but you don't

35:38

have any kind of push services, so you can't be ready

35:41

for that. That could be very damaging.

35:43

So I completely respect that

35:46

most people cannot and probably should

35:48

not completely eliminate push services

35:50

from their mobile device. It's what makes

35:53

these things smart. Of all of my

35:55

clients who have embraced graphene OS

35:57

as an ungoogled mobile device, I

35:59

would say over ninety percent of them have push

36:01

services enabled, and I am completely okay

36:03

with that. I just don't use it in my

36:05

life because I don't need it. Most

36:08

people need it, and frankly, most people want

36:10

it. So I dedicated an entire chapter

36:12

to push services, but let's talk about the

36:14

the brief version here. For on Google

36:16

devices, you have pretty much two options. You

36:19

have micro g, which is an open

36:21

source, mostly open source version

36:23

of Google's drivers on your device

36:26

at the operating system level, which will allow

36:28

your device to receive notifications and any

36:30

push services. And then you have

36:32

the stock Google push

36:35

services, the Google framework but

36:38

in a sandboxed environment within

36:40

graphene OS. That is the way I

36:42

prefer it. If you're going to use push services,

36:46

I believe the implementation in Graphino

36:48

West using the actual Google

36:50

push services but sandboxed

36:52

into a limited application, which doesn't

36:54

have root access to your entire device, is

36:57

superior than putting micro g

36:59

and letting it have unfettered access

37:01

to everything. That statement has upset

37:03

a lot of people. I can hear your keyboard

37:05

typing right now. This is just my opinion.

37:07

You might disagree. I think

37:09

using Graph OS and enabling their

37:12

push service implementation is

37:14

the way to go if you need it. It's also extremely

37:16

easy to disable any time you want. This

37:18

becomes extremely important when you

37:20

need to accept VoIP phone

37:23

calls or you need to be notified of emails or

37:25

text messages, which we get into quite a bit in

37:27

the book, I already see that I'm supposed

37:29

to be at about the twenty minute mark here,

37:31

and we are way past that. So let's keep moving

37:33

on this. Again, the book is more detailed.

37:36

I'm just trying that overview of what we

37:38

care about when it comes to mobile devices. The

37:40

bottom line here is most people

37:43

I know who embrace Graph

37:45

OS also embrace Google's

37:47

push services in a sandbox limited

37:50

way through GraphinoS. I

37:53

think that's the best way to do it. Next, chapter

37:55

six is application installation. And while

37:57

I'm upsetting people, let's continue that train,

38:00

I still recommend F droid

38:03

and Aurora store. Now

38:05

every week, at least once a week,

38:08

someone e mails me and says you really

38:10

need to stop recommending f Reuters or Aurora

38:12

store. There's all kinds of problems. There's all kinds

38:14

of They're bad bad things. They're borderline

38:16

malicious. Blah blah blah blah. Almost

38:19

every single one of those emails refers

38:22

to one single blog post

38:24

of person who seemed quite

38:26

upset at Eftroid and outlines

38:28

all the problems everything from their websites

38:30

ugly too. They don't update it enough. My

38:32

stance is this. If you are truly

38:35

worried, about being tracked

38:38

in any way possible on

38:40

a mobile device, then you should not

38:43

be using a mobile device. If

38:45

you're expecting absolute perfection

38:48

of no application knows anything you're ever

38:50

doing on this thing and no cell phone company

38:52

knows anywhere you are, then a mobile device

38:54

is not for you. We have to have some realistic

38:57

expectations. Now, the blog post

38:59

I'm talking about, their solution, instead

39:01

of f droid and Aurora Store, is

39:03

to install the Google Play Store,

39:06

sign in to your Google account, and just download

39:08

your apps from Google, which I

39:10

don't see any way that

39:12

is better from a privacy perspective. The

39:15

whole point of a Graphino's device is you

39:17

don't need a Google account in order to use it.

39:19

So connecting your Google account

39:21

to your device in order to avoid using

39:23

something like F droid. I don't

39:25

get it. Maybe you disagree and that's

39:27

fine. For most people out there that

39:29

just seems backwards to me. So

39:31

chapter six walks you through proper eff joint

39:34

installation, proper eff storage configuration?

39:36

What should we turn off? What should we change? How

39:38

should we do the Aurora Store? What do we need to change

39:40

to make Aurora Store work on any other website?

39:42

Which one's the Google Play Store? It's

39:44

stuff I've talked about before. Some of it

39:46

is in extreme privacy fourth edition.

39:48

I just tried to update that and really make

39:51

everything step by step. So

39:53

you there's really no leniency

39:55

there to maybe make the wrong decision.

39:58

Again, these are my opinions and they might not

40:00

be yours, but the book tries to give you

40:02

here's the way I do it from my clients and you can

40:04

adopt or adapt from there. That chapter

40:07

also gets into using NextDNS

40:09

while you are in stalling your applications to

40:12

see what they are doing behind your back

40:14

and blocking that when necessary. Let's

40:16

fast forward a bit here and let's talk about chapter seven which

40:18

is cellular service and this is where

40:21

we start to get into, okay, now that we have

40:23

this device, now that we have it set

40:25

up the way we want it, how do we connect

40:27

it because we need that cellular service. Now,

40:30

this chapter is the one chapter

40:33

which is heavily focused for US audiences

40:35

because that's what I know, but the other

40:37

chapters get into more international considerations

40:40

as well. I do talk about mobile,

40:43

which is a T Mobile reseller. I still

40:45

think that's one of our best options because

40:47

we can provide any alias name we want.

40:49

We can provide masked debit

40:51

card payments through something like privacy dot com. We

40:53

can use secondary credit cards. And

40:55

we're not buying it directly from T Mobile. We're buying

40:58

it from a reseller. I think that's important.

41:00

Not only because they don't verify information you

41:02

give them, but also we have at least one

41:04

small, very thin layer between

41:07

us and the telecom themselves.

41:09

The big difference here from previous

41:12

writings is we have adopted

41:14

the eSIM option more

41:17

than the physical SIM. In the past, I've always

41:19

talked about, you get a physical mint

41:21

SIM card or whatever service you use, get your get

41:23

your SIM card, have them send it to you, have them ship it to

41:25

you. Okay. Well, now we have connection to our home

41:27

address or to a PO box or something where

41:29

we have access. With

41:31

the eSIM, we can order our service

41:34

online, we can program it and be ready

41:36

to go that day without ever giving a home

41:38

address or even a PO box in the area

41:40

you live. Now part of that might

41:42

be pointless because the cellular provider

41:44

is going to know what towers you're connecting to

41:46

they already know what general area you're in, but

41:48

I don't have to give them physical address.

41:51

For most of our clients, we

41:53

issue eSIMs and program their

41:55

phones, we don't rely on physical SIM cards.

41:57

I explain a lot about that process, about the

41:59

programming process. It's not too complicated,

42:02

but some services make it harder than others.

42:04

Specifically, I talk about some problems with However,

42:07

you can get a right now,

42:09

it's a thirty day free trial with

42:11

an eSIM. I can get on chat

42:14

with Met Mobile on a website behind

42:16

a VPN and have one month of free

42:18

cell phone service without giving them any

42:20

real information about me or

42:23

any kind of payment. That's quite nice.

42:25

I also talk about other providers. I talk

42:27

about telo, TELL0, which is an

42:29

option I've used. They are also a

42:31

T Mobile reseller, but you can buy just

42:33

a number. You can buy just data. You can

42:35

buy limited data. I have clients

42:38

who have nine dollar monthly plans

42:40

through telo that's all they need for

42:43

everything that they need for that phone. So I

42:45

walk you through some of those options. I'm

42:47

not a total meant fanboy,

42:50

especially if they're going to sell out the T Mobile,

42:52

so we have to have other options. I try

42:54

to be a bit more fair in this writing

42:56

to include many more options which

42:58

might give you a wider range

43:00

of choices. The other beauty of eSIM

43:02

is we can have multiple accounts. I can have

43:05

five cellular accounts, each with their own

43:07

e SIM programming, and I can enable and disable

43:09

each one one at a time and use any tower, any

43:12

service I want. I talk a lot about secondary

43:14

accounts, affordable secondary accounts,

43:17

and how you can have multiple real

43:19

cellular numbers, but can never connect

43:21

to that cellular account. We can use WiFi

43:23

calling. We there's all kinds of options here.

43:25

I have clients who want

43:27

a burner true cell phone number, which

43:29

they can provide to their bank when they have to log in,

43:31

but they don't ever want that number to connect

43:34

to a cell phone tower and be connected to that profile.

43:36

So we can just disable that when we don't need

43:38

it. So you have a lot of options with

43:40

graphing OS and with the Pixel. You

43:43

have a physical SIM slot, but you

43:45

also have that eSIM slot which you can

43:47

program and that just opens up

43:49

so many new opportunities especially

43:52

when we get into data only plans which we'll talk

43:54

about in just a moment. I do also talk

43:56

about AT and T and Verizon. I'm not stuck

43:58

on T Mobile. I know that their service isn't

44:00

great everywhere in the country, so I do give

44:02

you some options for them. And again, they're

44:04

pretty cheap at about fifteen bucks a month

44:06

for everything you would need. Overall, that

44:09

chapter is just designed to say here

44:11

are some options you might not have

44:13

known about with eSIM

44:15

stuff. And and also here's the way that GraphinoS

44:17

will allow you to disable not only your

44:20

but also your physical SIM, which is another important

44:22

thing. I can disable both my physical

44:24

SIM and my e SIM. And then if my phone

44:26

ever leaves airplane mode for whatever reason,

44:29

yeah, I'm probably going to be throwing out some

44:31

signals there. Yeah, I'm probably gonna be

44:33

sniffing around the the closest tower.

44:35

But my physical SIM card,

44:38

which is an connected to an account is not going

44:40

to connect. And my eSIM account,

44:42

which is not going to connect because

44:44

it's disabled, it's not just broadcasting,

44:47

hey, here I am. So my phone's out

44:49

there, but my accounts are not out there. So

44:51

I think that's another nice feature we have.

44:54

Most devices tell you if you want

44:56

to disable the physical SIM card,

44:58

remove it. Graphina West, let's

45:00

just say, no, just toggle that switch off

45:02

and don't connect that card anymore. I

45:04

like that feature. Alright. Chapter eight gets into VoIP

45:06

service. VoIP service.

45:09

A lot of this is brought over

45:11

from Privacy Fourth Edition, but a

45:13

lot of it is also new. Now,

45:16

I've talked before about VoIP. This is

45:18

where we can buy phone numbers, Internet

45:21

based true phone numbers, and we

45:23

can set up an account with a service

45:25

which allows us to use that phone number for

45:28

phone calls and text messages, but

45:30

it's not a cellular number. It's not connected

45:32

to a cell phone tower. It's not It doesn't

45:34

know where we're at at all times. It's not

45:36

tracking our location. I

45:38

rely on VoIP telephone numbers at

45:41

all times. I don't ever use my true cellular

45:43

number because that's connected to my location at all

45:45

times. So I use voice over IP

45:47

numbers. Now in the past, it's

45:49

been Twilio versus Telmex.

45:52

And it still is Twilio versus

45:54

Telmex. But before we get into that,

45:57

I get into domain registration. If

45:59

you plan to make a Twilio

46:01

or Telmex VoIP account, you're

46:04

going to have to convince them that you

46:06

are worthy of paying them money for their

46:08

services. They only want businesses. If

46:10

you sign up with a Gmail or a Protonmail or

46:13

forbid a to Tenoda email,

46:15

your account's gonna get suspended. They're not gonna give

46:17

you access. So I talk bit in this book about

46:19

what we do every client

46:21

when they get a new device, they also get a new

46:23

domain with wild card emailing so

46:26

that they can have a what appears

46:28

to be a business, a true business domain

46:30

to sign up for services. What I

46:32

talk about in the book specifically is how to

46:34

find dropped domains, not

46:37

expired domains, dropped domains,

46:39

which had a business reference, which

46:41

had a history on all the services, which these

46:43

companies use to vet their customers to

46:46

basically bypass all of

46:48

these all the scrutiny to

46:50

see if you really are a business. I won't get

46:53

into every detail here on a public show, but

46:55

it is in the book to talk about here's

46:57

the easiest way to get a business

46:59

domain which has been around for fifteen

47:01

years. It's got stuff on archive dot

47:03

org. It's got stuff and all the marketing SEO

47:06

type stuff. And when you take it over, you can

47:08

now be the owner of that and use wildcard email

47:10

addresses for that and probably

47:12

pass the scrutiny of places such

47:14

as Telmex and Twilio. We're not

47:16

doing any fraud. We just want to

47:18

pay them to buy their service. Unfortunately,

47:21

today, you have to prove you're worthy

47:24

of that. It's just the way it is. So

47:26

talk very specifically how you can spend nine bucks

47:28

a year and have unlimited use of

47:30

a an existing vetted

47:32

business domain, including

47:34

all of the email forwarding as well. You do not

47:36

need a host for that. After

47:39

that, I get into all the VoIP stuff.

47:41

So let's jump into that now. I still prefer

47:43

Twilio for all of my VoIP

47:45

needs. When you see

47:47

third party providers that offer a burner

47:51

application or second line, whatever it might

47:53

be, They're just buying Twilio numbers

47:55

and upcharging you for it. So many

47:57

people constantly say, oh, you should recommend JMP

47:59

chat because you can buy a phone number

48:02

for only three bucks a month. Yeah, but

48:04

they're just getting it from Twilio for dollar

48:06

a month. I'll just go get it from Twilio for a dollar

48:08

a month, not pay the extra two dollars a month and

48:10

have the exact same number and the exact

48:12

same service I could ahead, I'm just cutting

48:14

out the middleman. So I don't like

48:16

a lot of these middleman applications when

48:18

I can just go do it myself. Now

48:21

I walk through all of the settings

48:23

currently for Twilio, which

48:25

includes ringing your phone.

48:28

And past, I've used Lynnphone

48:31

in my books to talk about using

48:33

voice over IP to make and receive telephone

48:35

calls. I do not use Lynnphone on a mobile

48:38

device anymore. Their desktop applications

48:40

I have a use for still, but

48:42

I don't like Lynnphone for iOS

48:44

or Android to just not reliable anymore.

48:47

I have switched one hundred percent to

48:49

SIP and ETIC, I

48:51

believe. And the book walks through

48:53

every setting. If you are using Symptic

48:56

for your VoIP calls and you're having an issue,

48:58

it's a configuration. And the default

49:00

configuration is not good enough. So I do walk through

49:02

all the details and you can kind of play with them if

49:04

you want to get it right. But basically, symptomatic

49:08

with Twilio even or Telmex should

49:11

absolutely reliably ring

49:13

your phone when a call comes in as

49:15

long as the background service is running

49:17

on your device. And you do not need push

49:20

notifications for that to happen. That's

49:22

why I like Symantec. I can leave that on

49:24

and I have dozens of phone numbers

49:26

through various VoIP providers, and all of them

49:28

will ring my phone and I can answer a call,

49:31

which is not possible on services

49:33

which we rely on push occasions.

49:35

That's why I like hyphenetic for that. Again,

49:38

I get into a lot of detail there. As

49:40

far as Twilio, most of the steps

49:42

from privacy fourth edition work

49:44

I did have to tweak a couple of things,

49:47

mostly because Twilio has changed their menus,

49:49

but nothing more than that. So a

49:51

lot of that is going to be recycled from

49:54

the fourth edition, including setting everything

49:56

up for SMS. I still

49:58

prefer to forward my incoming

50:00

SMS call or SMS text

50:02

messages from Twilio or Telmex

50:04

whoever to email. I don't

50:07

need to ever send SMS messages

50:09

from those accounts. That's not what that's for.

50:12

And that is going to cause more scrutiny with

50:15

the VoIP services. They might want you

50:17

to register as an email sender like

50:19

a a marketing person and we don't want that.

50:22

I use voice over IP through

50:24

Twilio and Telmex for receiving

50:26

voice calls, making voice

50:28

calls, and receiving SMS

50:30

text messages via email. That's

50:33

it. That's the way I recommend that most

50:35

people use them. That brings us into Telmex,

50:37

which I've had a love hate

50:40

relationship with both Twilio and Telmix. I've had

50:42

my problems with both of them, more

50:44

so Telmix in the past. There

50:47

there are some pros and cons of Telenex.

50:50

The pro is simply is cheaper. You

50:52

you pay a bit less per month

50:54

for a number. But

50:56

there are some cons. Telmex

50:58

will only give you an account if you are a confirmed

51:00

business, but that's probably pretty fair to say

51:02

with Twilio now too, so that's a wash. My

51:05

biggest complaint about Talnix is they

51:07

no longer provide any actual

51:09

customer support. You can open a support

51:11

ticket and you will get canned messages and then

51:13

they will close the ticket and you will not actually get

51:16

help with your problem. I've seen that time and time

51:18

again. Telnex does not

51:20

provide voice mail. Twilio does. Telnex

51:23

does not allow you to delete your user

51:25

logs. Twilio does. That's kind

51:27

of a big one for me. My other big gripe with

51:29

Telenex is they will suspend your paid

51:31

account with a balance on it if they don't

51:33

like what you're doing. And when

51:35

that happened to me, I ask them

51:37

about why it happened and I was ignored.

51:40

Now, if you have a Telmex

51:42

account, great. There's no reason

51:44

to leave them. If you have a Twilio

51:46

count, great. No reason to leave

51:48

them either. If you had to choose one, I

51:50

think Twilio is the better option.

51:52

However, I'll explain this in a moment,

51:54

but I had conversation with the Telmex CEO

51:57

OSINT, and I really I think

51:59

I overwhelmed him with my frustration about his

52:01

company, and he is he has reinstated

52:04

a an affiliate link,

52:06

which will give you twenty dollars in free usage.

52:09

And then it gives me my test account,

52:11

which we do our research with twenty dollars

52:13

that we can use for free too. I don't get any money

52:15

from them. We just get free credits that people use it.

52:17

So I put that in the book. Whether

52:20

it works or not, I don't know. They've kicked my

52:22

affiliates out several times, so who

52:24

knows if this will be any better? If you have neither,

52:26

I would start with Twilio and see if it meets your

52:28

needs. If you can't get Twilio

52:31

account, I would try Telmex. They might be a bit

52:34

a bit less scrutiny now. I don't know

52:36

because I don't really have a good way to try that,

52:38

but you do have options. Most

52:40

people if you're like me, you want

52:42

both and you want some funding within

52:45

both to have redundant options. I

52:47

think that's always great too. So I also

52:49

walk through configuration, next

52:51

configuration with sat Sipanetic and

52:54

basically the exact same thing we had in the book

52:56

just with updates. I do

52:58

talk about my pseudo MySuedo is

53:00

a VoIP reseller. Basically, they

53:02

have an app which will let you have up to nine

53:04

telephone numbers, all isolated within

53:06

profiles. You can make calls. You can

53:09

receive calls. You can send text. You can receive

53:11

text. Financially, it

53:13

is cheaper to get Twilio

53:15

numbers through my pseudo than

53:17

to buy them yourself because they buy

53:19

in book. The big problem

53:22

with my pseudo is you have

53:24

to have another device which

53:26

does have either Google services or Apple

53:29

services in order to pay for your account.

53:31

I have been talking with the CEO about

53:33

resolution possibly to this I don't

53:36

have anything to report right now, but it's

53:38

on their radar. So if you want my suit

53:40

on your graphene OS device, you have

53:42

to pair it with another device

53:45

which has that same my pseudo connection

53:47

on it and a way to pay for it such as

53:49

through Google Pay or Apple's App

53:51

Store. If a solution comes up for

53:53

that, I think I'll be one of the first to

53:56

know and therefore you will be one of the first

53:58

to know about it. What do I do?

54:00

I do have my suit on my graphene OS

54:02

device. And it works great.

54:05

And if I enable Google's push services

54:08

sandboxed within Graphite

54:10

OS, calls come through just fine. I

54:12

get notified of text everything works great

54:14

except I can't renew. So what I do

54:17

is I have an old iPhone SE original,

54:19

old school and it has one app

54:21

on it, MySoto. And once a year, I

54:23

OSINT that app, I boot that phone up, I charge

54:25

it, I open the app, I renew my

54:28

subscription to MySoto, I

54:30

use a gift card

54:32

to fund the account. And then when I renew

54:34

that, since I've paired those two together,

54:36

it automatically renews my graphics device.

54:38

And I don't turn that phone on for another year.

54:41

I know that's getting maybe out of scope

54:43

for some people, but my suit is the

54:45

easiest of all these options and it's actually

54:47

the cheapest. So I understand the

54:49

need for it. I have one

54:51

of everything, so I want Twilio, I want Telnix,

54:54

I want my suit, I want all these options

54:56

because I like the redundancy. The book also

54:58

talks about porting. I won't get into that.

55:00

Nothing new really has changed there. It also talks

55:02

about VoIP suite. I've talked about

55:04

that before. It's the open source application

55:07

created by a member of my online

55:09

video training. They now have

55:11

a an Android app,

55:14

which does work on Graph OS. It has its own

55:16

push services in it. Right

55:18

now, it's not on Android yet, but

55:20

they have submitted to that. So I haven't tested

55:22

it fully yet, but I do have just a blurb

55:24

in there of if that

55:26

makes sense to you, go do it. allows you to send

55:28

and receive text messages from

55:30

Telmex or Twilio within

55:33

an app with notifications instead

55:35

of using the email route. So haven't tested

55:37

that thoroughly. I don't know how the app

55:39

works compared to the web based app.

55:42

But it still requires you to set up

55:44

on your own self hosted online

55:46

server, which most of my clients just said

55:48

we don't wanna deal with that. So they

55:50

would rather just get the email. I picture this show

55:52

running an hour even, and we're not

55:54

even, guess, we are halfway through. Alright.

55:56

Let's keep pushing through You're tired of my voice.

55:59

Maybe pause this and pick it up tomorrow, but let's keep pushing.

56:01

Let's talk about chapter nine data service.

56:04

This is something brand new I've been using. A

56:06

lot of my clients don't want a traditional

56:09

cellular account. They don't want that mobile

56:11

T Mobile AT and T Verizon account.

56:13

They want something that doesn't have

56:15

a phone number attached to it. They just need data. They're

56:17

not using their phone number anyway. Why am I paying for this phone

56:20

number? I'm never using it. I just need some data

56:22

and I don't need a whole lot of it. So I do

56:24

talk a bit about data only

56:26

service plans. These are providers which will

56:28

say, we'll sell you data

56:30

and you can use that data on your device any way

56:32

you want it. And then when you're out, you're out and

56:34

you buy more data or you don't. You

56:36

don't need a phone number. You don't need a commitment.

56:39

You don't need a contract. You don't need anything.

56:41

You don't need AutoPay every month,

56:44

just buy data when you want the data, and

56:46

there are some very valuable uses

56:48

for that. There are plenty of online providers

56:51

which are resellers which will sell you

56:53

this data. These a lot of these are ran out

56:55

of Hong Kong, and they have contracts with

56:57

all the different carriers all over the world, and

56:59

they're designed for travelers. If you are person

57:01

going to the UK, your AT and T

57:03

might not work there, so you might want to buy a

57:06

UK provider just some data for the

57:08

week, that way you have access to your mobile

57:10

device. I don't use

57:12

those providers too much. Instead, I

57:15

use cellular services by

57:18

Twilio and Telmex. You

57:20

can buy physical SIM cards from Twilio

57:22

and Telmex, which you can pop

57:24

into your device, and they can

57:26

access data from any

57:28

major carrier. So if you're in the US,

57:31

wherever you are, it will connect you to the closest

57:33

AT and T T Mobile Verizon,

57:36

maybe US cellular tower, and let

57:38

you use that tower only for data,

57:41

and then pay per megabyte at

57:44

those providers. And this whole chapter walks you through

57:46

that entire process. There are many considerations

57:48

here. I have many warnings about it,

57:50

but it does work for a lot of people. What

57:53

I like is to have it as a secondary

57:55

or backup option. I prefer

57:57

Twilio over Telmex because Twilio

58:00

has international capabilities and

58:03

Twilio allows eSIM programming.

58:06

On my Graphio's device, I have an

58:08

OSINT for Twilio. I can

58:10

be anywhere in the world, turn that

58:12

on and have data, and I pay ten

58:14

cents per megabyte, which is a lot So

58:16

if you're going to do that, please heed

58:18

the warnings in the book about limiting your

58:21

background data, turning off auto updates,

58:23

make sure that your phones not downloaded

58:25

much of data in the background eating up

58:27

all of your ten cents per megabyte and now you

58:29

have this big bill and you're pissed off

58:31

at me. Telmics is

58:33

cheaper, much cheaper. It's

58:36

one cent per megabyte and

58:38

only two dollars a month for access

58:40

instead of three dollars month from Twilio,

58:43

especially if you want the Verizon Towers. Again,

58:45

we're we're we're over on time, so

58:47

I won't get too much into it. The book has much more

58:50

detail on that. What do I do?

58:52

I use Twilio for all of my international

58:54

data and I use Telmex

58:57

for a lot of my domestic data as a backup

58:59

if I don't want my account

59:01

through t mobile slash mint for

59:03

whatever reason. The best part for me is

59:06

I can go to any country, connect to their cell

59:08

towers, Those cell towers know

59:10

my device. They get a unique ID.

59:12

They know my OSINT but they don't know

59:14

who I am. Instead, they are

59:16

billing Twilio for my usage and

59:18

Twilio is just deducting it from my balance.

59:20

And if you're careful and only turn on your phone when

59:22

you need to access your email, when you need to make a signal

59:25

call, when you need to check an instant message, you

59:27

don't use that much data if you're not doing

59:29

other things in the background. I've

59:32

I took a month and relied just on

59:35

one of these programs and it was like nine bucks

59:37

for the month. It was actually cheaper than my

59:39

subscription. So you have to be careful

59:42

but if you're only using your phone for communications

59:44

and not watching four k video, you

59:46

could get by on one of these alone and not

59:48

have any phone number assigned to your account, which really

59:51

reduces a lot of issues. It

59:53

eliminates the possibility

59:55

of a SIM swap because you don't have a phone

59:57

number to even start the account with. With,

59:59

and the eSense can only be programmed one

1:00:01

time. You can't change those anyway. It

1:00:04

also prevents a lot of tracking

1:00:06

which can be done based on your cell phone number

1:00:08

because you don't have a cell phone number. You

1:00:10

have an account, but you might be connected

1:00:12

to an AT and T tower for five minutes and then connected

1:00:14

to a Verizon tower after that. So

1:00:17

you are a much smaller needle and

1:00:19

a much larger haystack. But again,

1:00:21

there are many warnings with this, so

1:00:24

don't just jump into that. Read

1:00:26

everything and understand all the warnings before

1:00:28

you say whether or not that might be for you.

1:00:30

Alright. Let's fast forward. This is getting

1:00:32

way too long. Chapter ten, secure communications,

1:00:35

I talk again about my

1:00:37

preferences, water, signal, whatever it

1:00:39

might be, proton male, to to nota,

1:00:42

any kind of settings. But a lot of that has

1:00:44

not changed and we've talked about so much of

1:00:46

this on the show. I don't feel like we need to revisit

1:00:48

every part of it. You probably have

1:00:50

already established your preferred secure

1:00:53

communications. If you have not, then you should

1:00:55

do that right away. I

1:00:57

prefer signal for most things because

1:01:00

it's the easiest for other people

1:01:02

to use. It's the easiest for my

1:01:04

friends and family to adopt versus I

1:01:06

had to remember a password for wire,

1:01:08

what? I don't just text me. Signal

1:01:11

is just the easiest for conversion in my

1:01:13

opinion, but you can read about some issues

1:01:15

there. Chapter eleven gets into VPN configuration,

1:01:17

but This is not a show about

1:01:19

VPNs. This is a show about mobile

1:01:22

devices. The only thing I do talk in

1:01:24

there about with mobile devices is

1:01:26

how I always have VPNs ready

1:01:28

on my mobile device because of issues

1:01:30

I've run into. For example, if I'm

1:01:32

in a country, which is not supported

1:01:35

by say my pseudo. I

1:01:37

can't make a phone call on those numbers because

1:01:39

I'm on that country's IP address. But I

1:01:41

can launch my VPN, connect to a US server,

1:01:43

and now I can use my pseudo again. So those things

1:01:45

are important. I talk a lot about clients

1:01:47

who have they have to use their banking

1:01:49

app on their phone. They have deposit checks,

1:01:52

they have to transfer money, whatever. Every

1:01:54

time they log into that banking app, it checks

1:01:56

for VPNs. They they now need a VPN,

1:01:59

which has a dedicated IP address, which

1:02:01

can bypass that restriction. So

1:02:03

we have some situations where

1:02:06

you absolutely need a VPN on

1:02:08

home, but I do also talk a lot in that

1:02:10

chapter about how I am not always connected

1:02:12

to a VPM on my device. My device

1:02:14

isn't calling out to Google and Apple. I don't worry

1:02:16

about that. My device service is not connected

1:02:19

to my name at all. Do I care

1:02:21

that T Mobile knows I'm checking my

1:02:23

proton mail? I don't care. It doesn't.

1:02:26

Tell them my content. They don't see anything about

1:02:28

what I'm doing. I don't care that T Mobile

1:02:30

knows that Mobile has

1:02:32

sold a prepaid plan to

1:02:34

an anonymous person who happens use

1:02:36

proton mail. That doesn't hurt

1:02:39

me in any way. So one thing I talk about

1:02:41

in the book is that I don't always use

1:02:43

a VPN on my mobile device. If it's not

1:02:45

necessary and that's gonna really

1:02:47

exceed the scope of this show. If you want more details,

1:02:49

obviously, it's there. I talk a bit about device

1:02:51

customization, how you might

1:02:53

want a different launcher for your phone. Graphiness

1:02:56

is great. It's minimal. I don't like

1:02:58

their default home screen. I want to fit more eye

1:03:00

icons on it. I want to customize my icons.

1:03:03

I want to change the name. I want to show

1:03:05

labels on my applications in the

1:03:07

doc. I don't want truncated names.

1:03:10

So I talk about options

1:03:13

for custom launchers. I

1:03:15

talk about long chair two a bit,

1:03:18

which is it's

1:03:20

no longer maintained. It's now being taken

1:03:22

over. It's now a launcher twelve, I believe, but it's

1:03:24

an alpha. It's not ready for

1:03:26

widespread use. So I'm still using launch

1:03:29

chair to and

1:03:31

I'm using the version from Aurora

1:03:34

Store, not the lawn chair version in f

1:03:36

drawer, which is even more outdated. I talk

1:03:38

a lot about the confusion there, but I like

1:03:40

long chair two as

1:03:42

my custom home screen. It

1:03:45

allows me to really change the way it looks.

1:03:47

I give examples, but it allows me to

1:03:49

control my icons. It allows me to control my labeling.

1:03:51

It allows me to control how many I can have on my

1:03:53

screen. That's important to me. It

1:03:55

might not be important to you, but it's really important

1:03:58

to my OSINT. So that's something to

1:04:00

consider. I also talk about how

1:04:02

to create a screen on your device,

1:04:05

which you can swipe to, which has all

1:04:07

of your phone numbers visible. Because if you

1:04:09

are like me and you've got twenty five VoIP numbers

1:04:11

used for different things. And then the dentist

1:04:13

asks you, hey, what's your phone number?

1:04:16

I can't spot that off. I don't have them

1:04:18

all memorized, so I have sheet sheets

1:04:20

on my phone. I do that by downloading

1:04:22

simple notes, making the note

1:04:24

and putting a widget on my

1:04:27

home screen to the right, which I can swipe to and

1:04:29

see whatever number I need right away. Let's

1:04:31

talk profiles. Your graphene OS

1:04:33

device allows you to have multiple

1:04:35

profiles This allows you to boot

1:04:37

into different instances so to

1:04:39

speak of your device, and you can have

1:04:41

applications in one profile which are not available

1:04:44

in the other profile and vice versa.

1:04:46

This has been official. When you have

1:04:48

an application which is kinda

1:04:50

dirty, maybe you need Google Maps.

1:04:52

You've gotta have Google Maps. I respect that.

1:04:55

I don't want that in my home profile,

1:04:58

but if I had to have it, I'd probably put it

1:05:00

in a secondary profile so you could

1:05:03

do that. Also, you

1:05:05

could have a secondary profile. And

1:05:07

in that profile, maybe you have enabled Google

1:05:09

Push services and you have Google Maps and

1:05:11

all those things you need. And then ninety

1:05:13

nine percent of the time, you are not booted into

1:05:16

that profile, instead you are booted into your home

1:05:18

profile. But when you need those services,

1:05:20

you could always go to them without dirtying

1:05:23

up your entire device. Full disclosure,

1:05:25

I do not use profiles. I don't need

1:05:27

them. They're fun. They're

1:05:30

neat. I just don't need

1:05:32

it. And for me, it's more about

1:05:34

simplicity and reducing

1:05:36

complication. But if you want

1:05:38

profiles, of course, you can look at that too.

1:05:41

Chapter thirteen, maintenance and troubleshooting. It

1:05:43

really just goes over updating your device,

1:05:45

battery drain issues, backup issues.

1:05:47

How do you deal with your photos? How do you deal with

1:05:49

notifications? Again, we've talked about that

1:05:52

lot already, but I tried to spell

1:05:54

out the things you're going to most commonly

1:05:56

have problems with. If I'm going fast

1:05:58

here, it's because we have exceeded. Our

1:06:01

our mark for the week. Chapter

1:06:03

fourteen, daily usage, best practices.

1:06:06

Again, things we talk about a lot in the show. I just

1:06:08

get more into faraday bags which

1:06:10

we've talked about recently, proper

1:06:12

usage of your device. One thing I have changed

1:06:14

my tune a bit on is the secondary

1:06:17

device. Years

1:06:19

past, I talked about having

1:06:21

a secondary device, but the reason was

1:06:24

I was relying on an iPhone mostly.

1:06:26

I was relying on an iPhone while I traveled and

1:06:28

I was relying on an iPhone or an actually an iPad

1:06:30

touch in my home. I don't want to

1:06:33

knock down this concept ahead of having

1:06:35

two devices, one, which connects to cellular towers

1:06:37

while you're out. And one which you use in your home

1:06:40

which never connects to a cellular tower to have that

1:06:42

isolation, but I don't do that anymore.

1:06:44

And the reason is I trust graphing

1:06:46

OS. If you can be

1:06:48

disciplined enough to

1:06:51

turn off your microphone, turn off

1:06:53

your cameras through the software

1:06:55

and graphics OS, and disconnect

1:06:58

your cellular connection before you get

1:07:00

home. I see no

1:07:02

reason to have a secondary mobile device

1:07:04

in the house. What I do,

1:07:07

at the same spot, when I used to drop

1:07:09

my phone into a Faraday bag before I get to my

1:07:11

house, I turn off my camera, turn off my microphone,

1:07:13

and go into airplane I do that real quickly for my

1:07:15

quick menu, and then I go home. And

1:07:18

when I get home, I connect to my WiFi.

1:07:20

I'm okay with that. Only because

1:07:22

I'm on graphics device. I would never do that

1:07:24

on a an Apple iOS device.

1:07:26

I would never do that on a stock Android device,

1:07:29

but I will do it on a custom ungoogled

1:07:31

Android device. And I think

1:07:34

that that eliminates a lot of the issue I

1:07:36

hear people saying about the complications with

1:07:38

having two devices. I don't know

1:07:40

that we need that anymore. If you're using

1:07:42

iOS, I think there's a very valid reason

1:07:44

to have that. Every time you reboot an iOS after

1:07:46

an update, it turns on your cellular connection,

1:07:48

turns on your Bluetooth, it It screams to

1:07:50

the world, hey, here I am. Where are you? And

1:07:53

you can't do much about that. Over the past

1:07:55

two years, I've updated my Graphino's

1:07:57

device numerous times, which involved

1:08:00

a reboot and not one time

1:08:02

did it disable airplane mode

1:08:04

due to a reboot. So I trust it more than

1:08:06

I do iOS devices. There's still

1:08:09

cases for everyday bags in

1:08:11

our life. There's still reasons to have

1:08:13

them, but I no

1:08:16

longer push my clients to the dual

1:08:18

device lifestyle and just have one device

1:08:20

in the house and one device out. It's

1:08:22

up to you on whether or not are

1:08:25

you that disciplined to do it right? And

1:08:27

I talk in the book about that in a bit more

1:08:29

detail, but I just want people to

1:08:31

know that if you're going to do that, great. Just

1:08:33

make sure you're doing it right. Make sure that you're

1:08:35

doing it right for your situation,

1:08:38

not anyone else's. Let's fast forward.

1:08:40

Chapter fifteen reset and reversal. It just

1:08:42

walks you through, let's say, you bought that

1:08:44

Pixel. You hate graphene OS, or maybe

1:08:46

you're going to resell it. You you you bought a new one and

1:08:48

you wanna sell this old one. Well, you need to wipe all that

1:08:50

stuff out. And doing a a reset

1:08:52

on your GraphinOS device just resets GraphinOS.

1:08:55

So that chapter just walks you through. Here's how to

1:08:57

get that stock pixel android

1:09:01

stuff back on your device so you can resell

1:09:03

it or whatever. Again, nothing

1:09:06

special there. You can get those instructions

1:09:08

on the Graphiness website. You don't need me for that. Chapter

1:09:10

sixteen is Apple iOS considerations, and

1:09:12

it's basically for Everyone's

1:09:14

still reading who's decided, I'm not

1:09:16

going to use an Android phone. I'm going

1:09:18

to use an iPhone. Fine. No

1:09:20

judgment. At least do this.

1:09:22

And I walk through all the settings that

1:09:25

I recommend on existing and new

1:09:27

iPhone devices to make sure you're at least as private

1:09:29

as you can be. Since this

1:09:31

show is more about making a truly

1:09:33

private and secure device using something

1:09:35

like graphene OS, I won't go through all those.

1:09:38

Also, It's a hundred and thirty five

1:09:40

page book with sixty thousand words. I can't

1:09:42

fit it all into a show and also

1:09:44

I want to provide some value to the people who are

1:09:46

actually going to buy it. Speaking of

1:09:48

that, if you think

1:09:50

any of this is interesting, if you want

1:09:53

to create your own graphene OS device,

1:09:55

if you want to dive in and do it the right way,

1:09:58

please check out our digital guide. It's fifteen

1:10:00

bucks and that includes updates.

1:10:02

So when we need to change something, you will get notice

1:10:05

to update. That being

1:10:07

said, you have to give me some type

1:10:09

of email address where I can send those updates.

1:10:11

It should be a masked email address.

1:10:14

It should be a forwarding email address.

1:10:16

It should be something that I can't search

1:10:18

about you and get all of your information. It

1:10:21

should be something that you designate to this

1:10:23

purpose. We talked about that a lot. Simple login

1:10:25

offers a free plan that'll give you masked

1:10:27

email addresses. The important thing is whatever

1:10:30

you decide to use, just make sure you have access to

1:10:32

it in the future because I'm confident

1:10:34

this book will need

1:10:36

updated and it will get updated often.

1:10:39

When it does, I want you to get the free updates

1:10:41

so that you have that and you can see

1:10:43

what's changed. Obviously, this book

1:10:45

is going to be pirated. It it's probably pirated

1:10:48

already. I don't care. Not worried

1:10:50

about that. It wasn't the piracy that that bothered

1:10:52

me with digital books It was the counterfeiting

1:10:55

that we had to constantly battle on places

1:10:57

like Amazon. We're not offering this

1:10:59

as a print book, so we don't have to we don't have to

1:11:01

really deal with that as much. So of course, it'll

1:11:03

get pirated, and you could download pirated version,

1:11:05

but you don't get the updates. And

1:11:07

the pirated version might be ten editions old

1:11:10

by the time you hear this. Who knows? So

1:11:12

what we're trying to do is provide value to people who

1:11:14

actually support the show. If you wanna support the show,

1:11:16

buy an ebook, hopefully it provides some value

1:11:18

to you. But we want to also say

1:11:20

Thank you for not pirating it. So therefore, we're

1:11:22

going to give you free updates every time we have

1:11:25

something to add to this. And we want to apply that to

1:11:27

whatever books we do in the future. If we do a

1:11:29

book just on complete

1:11:31

disappearance kit. Okay. Well, if you buy that book, you

1:11:33

should get all the updates for that topic.

1:11:35

That's the business model I want to switch

1:11:38

to because that takes me out of Amazon.

1:11:40

And that's really where I wanna be. Wow. Okay.

1:11:42

This show way too long.

1:11:45

Hopefully, you got something out of it and maybe you got

1:11:47

some ideas of what you wanna do. My

1:11:49

true goal is it encourages

1:11:51

you take the leap. You don't have

1:11:54

to be stuck with iOS. I think you'd be surprised

1:11:56

if you can just devote thirty days to

1:11:58

an ungoogled operating system such as Graph

1:12:00

OS on a secure and clean device,

1:12:03

I think you'll forget all those things

1:12:05

you thought you needed from Apple. I

1:12:07

think you'll like this better. think it'll feel

1:12:09

cleaner. I think it will feel like

1:12:11

you're not sharing as much information. It might

1:12:13

even feel faster. If you're ready to jump

1:12:15

in, please go check out our new ebook.

1:12:18

It walks you through every single step

1:12:20

of the process. Alright. Thank you.

1:12:22

Now I get to go disappear myself.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features