General Discussion Undecided where to post - do it here. |
Reply to Thread New Thread |
![]() |
#1 |
|
Just wondering what the concensus is on GSus'rs that own smart phones. Do you read or post on GSus with your smart phones? I was considering setting up an account with Gmail so I could link my phone to the web and surf here and there, but it seems so NWOish to me that I got spooked during the "Create and account" process.
|
![]() |
![]() |
#2 |
|
|
![]() |
![]() |
#3 |
|
|
![]() |
![]() |
#5 |
|
I don't know. |
![]() |
![]() |
#6 |
|
I don't know. |
![]() |
![]() |
#7 |
|
I don't know. Are you a criminal? Have you done anything wrong? So why are you afraid? I stepped out of this mindset just a short while ago. I have nothing to hide. I am not a criminal. I am standing for Truth, Morals and Reality. I will not be silenced, i will not change my life, i will not bend my actions like a game of Twister, to accomodate the NWO. BREAK YOUR CONDITIONING! *Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion.... |
![]() |
![]() |
#8 |
|
I don't know. I totally understand where you're coming from, but IMO if they want to know who awoke is with an unlimited budget like they have, I think they can find out regardless of what technology you use. |
![]() |
![]() |
#9 |
|
Don't own a smart phone or any other "smart" device. I work with technology, but, don't need to sign up to the volunteer information network in my personal life. Some get confused and upset when they realize that I'm not easily accessible. I don't give a sh*t. Leave me a message cuz there isn't anything that important that I need to have an electric dogtag on for............
|
![]() |
![]() |
#10 |
|
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now.
|
![]() |
![]() |
#11 |
|
cell phones are useless to try and hide. they can just look at the tower logs and from there, they can triangulate a signal to the mac id on the phone. even if you use the phone 10,000 miles from your home most of the time, eventually they'll cross reference the id on the phone + the id browsing history + find out who you are. i saw a demo at least 7 years ago where they could figure out what phones on a map belonged to who. that was with shitty flip phones, i can only imagine now. |
![]() |
![]() |
#12 |
|
Awoke, it would benefit you to learn about PGP/GPG encryption...
You can encrypt files with your private key, so that only you can decrypt it. You can exchange public keys and send encrypted messages to others. So if you use GMail, for example, you can encrypt a message using my public key, so that only I can decrypt it with my private key, and no one but us is privy to the contents of the email. GMail simply becomes a carrier by which random data (well, random to those without the key and the password associated with it) is exchanged between two parties. Seriously, if you are worried about this kind of privacy, you would do well to look into PGP and Tor. |
![]() |
![]() |
#13 |
|
|
![]() |
![]() |
#14 |
|
All great posts. Thanks everyone. I have no doubts that TPTB know who I am and where I am, but the stubborn side of me just resists the thought of handing it to them on a silver platter.
*Why do you need email to post to GSUS? Cant you just login with your username and pass, and post? I do this from my Iphone on occasion.... Awoke, it would benefit you to learn about PGP/GPG encryption... |
![]() |
![]() |
#15 |
|
Sure 'they' know who you are already, but it might take a dedicated human to sit down and do research on you to create a profile which must then be analyzed.
If you use certain things however, they can then use automated tools to parse your information and create the profile without any work at all. Things like Facebook, Gmail, and Android phones would probably allow them to do this. I don't think privacy is an all-or-nothing thing. |
![]() |
![]() |
#16 |
|
I don't have an Android device/phone... but I do most of my reading and posting here using my iPad (1st Gen.) or my iPhone 3. The only real problems I've run into is that it's difficult to view video clips (not impossible...) and I can't upload images, so I end up hotlinking them when needed. I don't care about anonymity from TPTB, as an earlier poster correctly pointed out they know who we are if they want that info. I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to.
Overall, though, it's a satisfactory forum browsing experience with my devices. |
![]() |
![]() |
#17 |
|
I have two apple products, iphone and ipad, I bought the iPad cause of Gaillo recommendation,
for reading PDF's , works great, also great, saves me time getting mail and quick news, I keep it out of my bedroom though, once I am in there I do not want to know anything about what you peeps are doing on here. ![]() I wouldn't worry about the gov, you should stay anonymous on the forums though. Use anonymous email, not tied to anything, this is how skyvike was outed as high level mason, email. added after Gaillo thanked post, DEC 2007 http://i46.tinypic.com/izvujt.jpg Save this, make baldy sweat, this is a response to the attacks on me by your agents, more is coming skyvike. |
![]() |
![]() |
#18 |
|
I don't use a proxy or forwarding server anonymizer, I suspect that if they're not outright .gov owned, then .gov SURE AS HELL is monitoring incoming and outgoing traffic through those things and is most likely able to re-construct the complete transmission path if they want/need to. |
![]() |
![]() |
#19 |
|
I've had the same thoughts about the encryption programs like Gonzo mentioned above. They give you a key. What's to say they don't keep a copy of the key for themselves or for the "authorities"? Also, when you get the file and open it with your key, I'll bet they can take a screen shot of it without you knowing it, thereby circumventing the need for them to even have a key. In short, there is no way to have private communication on the internet, so watch what you say. PGP encryption isn't a program, its an encryption algorithm. Many programs can use PGP, are some a trap?Its possible but very unfair to say they all do. Hell most modern Linux OSes come with their own encryption "programs" as part of the OS. Surely the open source community would out any nefarious encryption that came with the build. |
![]() |
![]() |
#20 |
|
Awoke, it would benefit you to learn about PGP/GPG encryption... I understand how Tor works, and how the 3rd server doesn't know anything about the 1st server and so on, but it is my opinion that the Gov runs at least one of the servers and scans the info, if it is deemed important to them they then do follow the trail through. I think the strongest reason for encryption is plausible deniablity. It is also my understanding that under the DMCA that it is illegal for someone (anyone) to hijack and decrypt a transmission that they were not the recipient of. A case which would certainly hold up in a just court, the problem being those are few and far between. |
![]() |
Reply to Thread New Thread |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|