LOGO
General Discussion Undecided where to post - do it here.

Reply to Thread New Thread
Old 07-06-2012, 03:48 PM   #1
Corporal White

Join Date
Oct 2005
Posts
495
Senior Member
Default Do you read/post from your Androids?
Just wondering what the concensus is on GSus'rs that own smart phones. Do you read or post on GSus with your smart phones? I was considering setting up an account with Gmail so I could link my phone to the web and surf here and there, but it seems so NWOish to me that I got spooked during the "Create and account" process.
Corporal White is offline


Old 07-06-2012, 04:12 PM   #2
Tibaveriafark

Join Date
Nov 2005
Posts
419
Senior Member
Default
I'm on my laptop, tethered to my Galaxy Note right now, does that count?
Tibaveriafark is offline


Old 07-06-2012, 04:20 PM   #3
Corporal White

Join Date
Oct 2005
Posts
495
Senior Member
Default
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
Corporal White is offline


Old 07-06-2012, 04:33 PM   #4
Wezfyowk

Join Date
Oct 2005
Posts
444
Senior Member
Default
i use my iphone all the time. they already know who & where you are anyway.
Wezfyowk is offline


Old 07-06-2012, 04:41 PM   #5
Xxmlqevq

Join Date
Oct 2005
Posts
393
Senior Member
Default
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
Isn't that what you are doing with any type of connection? I'm definitely not a techie, but I always thought that TPTB could trace us all pretty easily through our IP adresses. Unless you are savvy enough to run through a proxy or whatever - then it would only make it slightly more difficult for them.
Xxmlqevq is offline


Old 07-06-2012, 04:45 PM   #6
kylsq0Ln

Join Date
Oct 2005
Posts
502
Senior Member
Default
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
You could always visit GSUS on your phone through a third party browser like Skyfire, then through one of those anonymization websites like anonymouse.org.
kylsq0Ln is offline


Old 07-06-2012, 04:48 PM   #7
amannddo

Join Date
Oct 2005
Posts
410
Senior Member
Default
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
They already know who you are and what side you are on. Arent you PROUD of who you are and what side your on?

Are you a criminal? Have you done anything wrong? So why are you afraid?

I stepped out of this mindset just a short while ago. I have nothing to hide. I am not a criminal. I am standing for Truth, Morals and Reality. I will not be silenced, i will not change my life, i will not bend my actions like a game of Twister, to accomodate the NWO.

BREAK YOUR CONDITIONING!


*Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion....
amannddo is offline


Old 07-06-2012, 04:57 PM   #8
Tibaveriafark

Join Date
Nov 2005
Posts
419
Senior Member
Default
I don't know.
The principal issue is that by accessing GSus through my cel phone, with an account that is linked to my real personal identity, and then signing in as Awoke; Wouldn't I be waving a flag to the NWO dataminers saying "Here I am and this is who I am"?
At home, do you pay your ISP bill with your actual identity or use an alias? If you do than they can find you that way just as easily.

I totally understand where you're coming from, but IMO if they want to know who awoke is with an unlimited budget like they have, I think they can find out regardless of what technology you use.
Tibaveriafark is offline


Old 07-06-2012, 05:00 PM   #9
Zzvukttz

Join Date
Nov 2005
Posts
386
Senior Member
Default
Don't own a smart phone or any other "smart" device. I work with technology, but, don't need to sign up to the volunteer information network in my personal life. Some get confused and upset when they realize that I'm not easily accessible. I don't give a sh*t. Leave me a message cuz there isn't anything that important that I need to have an electric dogtag on for............
Zzvukttz is offline


Old 07-06-2012, 05:02 PM   #10
Wezfyowk

Join Date
Oct 2005
Posts
444
Senior Member
Default
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now.
Wezfyowk is offline


Old 07-06-2012, 05:04 PM   #11
Zzvukttz

Join Date
Nov 2005
Posts
386
Senior Member
Default
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now.
Thats right. So, if you don't own one, they don't be tracking you (at least for now).......
Zzvukttz is offline


Old 07-06-2012, 05:10 PM   #12
hapasaparaz

Join Date
Oct 2005
Posts
461
Senior Member
Default
Awoke, it would benefit you to learn about PGP/GPG encryption...

You can encrypt files with your private key, so that only you can decrypt it.

You can exchange public keys and send encrypted messages to others.

So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.

Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
hapasaparaz is offline


Old 07-06-2012, 05:24 PM   #13
Siuchingach

Join Date
Oct 2005
Posts
416
Senior Member
Default
I post from an android tablet (HP Touchpad w/ Cyanogen Mod installed) sometimes. I'm not worried about it. I don't post much that is inflamitory anyways. Just a regular Joe with a thrist for knowledge and sharing.
Siuchingach is offline


Old 07-06-2012, 06:13 PM   #14
Corporal White

Join Date
Oct 2005
Posts
495
Senior Member
Default
All great posts. Thanks everyone. I have no doubts that TPTB know who I am and where I am, but the stubborn side of me just resists the thought of handing it to them on a silver platter.

*Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion....
You need a Gmail account to set your Android phone account up to add apps and shit. I guess I don't need it to browse the forum, but just signing in over the phone is a dead giveaway anyways, I think.

Awoke, it would benefit you to learn about PGP/GPG encryption...
I know I should look into it. There are a few people here that use it, but I just figured it was a jew tool for datamining.
Corporal White is offline


Old 07-06-2012, 06:24 PM   #15
roundman

Join Date
Oct 2005
Posts
541
Senior Member
Default
Sure 'they' know who you are already, but it might take a dedicated human to sit down and do research on you to create a profile which must then be analyzed.

If you use certain things however, they can then use automated tools to parse your information and create the profile without any work at all. Things like Facebook, Gmail, and Android phones would probably allow them to do this.

I don't think privacy is an all-or-nothing thing.
roundman is offline


Old 07-06-2012, 08:22 PM   #16
OrefZorremn

Join Date
Oct 2005
Posts
526
Senior Member
Default
I don't have an Android device/phone... but I do most of my reading and posting here using my iPad (1st Gen.) or my iPhone 3. The only real problems I've run into is that it's difficult to view video clips (not impossible...) and I can't upload images, so I end up hotlinking them when needed. I don't care about anonymity from TPTB, as an earlier poster correctly pointed out they know who we are if they want that info. I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to.

Overall, though, it's a satisfactory forum browsing experience with my devices.
OrefZorremn is offline


Old 07-06-2012, 08:25 PM   #17
orgagsUpsepsy

Join Date
Oct 2005
Posts
446
Senior Member
Default
I have two apple products, iphone and ipad, I bought the iPad cause of Gaillo recommendation,
for reading PDF's , works great, also great, saves me time getting mail and quick
news, I keep it out of my bedroom though, once I am in there I do not want to
know anything about what you peeps are doing on here.

I wouldn't worry about the gov, you should stay anonymous on the forums though.

Use anonymous email, not tied to anything, this is how skyvike was outed as high level mason, email.

added after Gaillo thanked post,

DEC 2007

http://i46.tinypic.com/izvujt.jpg

Save this, make baldy sweat, this is a response to
the attacks on me by your agents, more is coming skyvike.
orgagsUpsepsy is offline


Old 07-06-2012, 08:45 PM   #18
Xxmlqevq

Join Date
Oct 2005
Posts
393
Senior Member
Default
I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to.
I've had the same thoughts about the encryption programs like Gonzo mentioned above. They give you a key. What's to say they don't keep a copy of the key for themselves or for the "authorities"? Also, when you get the file and open it with your key, I'll bet they can take a screen shot of it without you knowing it, thereby circumventing the need for them to even have a key. In short, there is no way to have private communication on the internet, so watch what you say.
Xxmlqevq is offline


Old 07-07-2012, 12:15 AM   #19
Siuchingach

Join Date
Oct 2005
Posts
416
Senior Member
Default
I've had the same thoughts about the encryption programs like Gonzo mentioned above. They give you a key. What's to say they don't keep a copy of the key for themselves or for the "authorities"? Also, when you get the file and open it with your key, I'll bet they can take a screen shot of it without you knowing it, thereby circumventing the need for them to even have a key. In short, there is no way to have private communication on the internet, so watch what you say.
Not to be a jackass, but that's not how it works...
PGP encryption isn't a program, its an encryption algorithm. Many programs can use PGP, are some a trap?Its possible but very unfair to say they all do. Hell most modern Linux OSes come with their own encryption "programs" as part of the OS. Surely the open source community would out any nefarious encryption that came with the build.
Siuchingach is offline


Old 07-07-2012, 03:18 AM   #20
Tibaveriafark

Join Date
Nov 2005
Posts
419
Senior Member
Default
Awoke, it would benefit you to learn about PGP/GPG encryption...

You can encrypt files with your private key, so that only you can decrypt it.

You can exchange public keys and send encrypted messages to others.

So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties.

Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor.
To your last point, I've always been leery of Tor, being that it was developed by the US Govt. I have always been of the opinion that since there is no feasible way to meaningfully sift through all of the data online, that they use programs like that to catch people who try to hide things. Kinda like how they go after people who turn on side streets coming up to DUI checkpoints.

I understand how Tor works, and how the 3rd server doesn't know anything about the 1st server and so on, but it is my opinion that the Gov runs at least one of the servers and scans the info, if it is deemed important to them they then do follow the trail through.

I think the strongest reason for encryption is plausible deniablity. It is also my understanding that under the DMCA that it is illegal for someone (anyone) to hijack and decrypt a transmission that they were not the recipient of. A case which would certainly hold up in a just court, the problem being those are few and far between.
Tibaveriafark is offline



Reply to Thread New Thread

« Previous Thread | Next Thread »

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

All times are GMT +1. The time now is 06:04 AM.
Copyright ©2000 - 2012, Jelsoft Enterprises Ltd.
Search Engine Optimization by vBSEO 3.6.0 PL2
Design & Developed by Amodity.com
Copyright© Amodity