phone security

What Information Can be Found With a Phone Number

When you consider connecting the dots to create a picture, imagine your phone number as the dot that connects everything else they know about you.  Even if they have it all, it is up to you whether or not they have the dot with your phone number to complete the picture.phone hacker

All it takes to find everything is to just find that phone number connected to one of the many things we already know like your facebook account (which requires a phone number) or any shopping card from a corporate retailer you may have given your number to.  Do you still believe those corporations don’t sell or trade your private information?  Well even if you do, it doesn’t matter because they are all systematically hacked a bare minimum of every 3-5 years.

Any email you get for free is being picked off as we speak.  It doesn’t matter if you gave the provider any phone information or not.  All you have to do is reveal your phone number in the text of an email and boom!! Mission accomplished!!  Free emails mine everything that comes across your screen, including drafts.  Why do you think they always want you to “secure” your email account with a phone number?

If you have connected to an old friend or new business acquaintance by email or social media and given them your phone number in a message it is connecting you to that phone number and that media account.

It’s called the world wide WEB for a reason.  Everything you do is sucked into a giant computer and maintained for profit and micromanagement of the public.  A good researcher can take an unknown phone number and use cell towers to “pair” it with other devices already known to be in your name.  For example: a burner phone (see our article on burner phones https://privacyliving.com/2016/05/17/what-is-a-burner-phone-how-can-it-help-me/ ) can have its owner pegged pretty efficiently when it is continually detected near the same owner’s normal cell phone or other smart device.  This can include cars with smart devices embedded in them.  By detecting an unknown phone continually traveling to the same places and staying at the same address all night along with already known devices it is easy to deduce that you are the owner.

As you can see, being truly anonymous requires some serious work but it is possible.  You can always pick up a copy of “Disappear in 24 Hours” by Lonn E Wolfenstein if you want to do a total makeover.  The book is available at Brave New Books in Austin TX or can be ordered by clicking the products link at the top of this page.

Advertisements

Secure Phone Messaging App

There are dozens of messaging apps for iPhone and Android, but one in particular continues to stand out in the crowd. Signal is easy to use, works on both iOS and Android, and encrypts communications so that only the sender and recipient can decipher them. – Theintercept.com

Read the full article here: https://theintercept.com/2016/07/02/security-tips-every-signal-user-should-know/

Will an Apple Insider Help the Government Crack Encryption?

The big news right now is the buzz around Apple being ordered by a judge to help the government break into an Apple phone belonging to a terror suspect.  This is not a new battle.  What many stories will leave off is that this battle has been going on between the federal government and Apple for years now.  The government was furious when the “unbreakable” encryption came out and has been trying to get Apple to give them a back door ever since.  To put it in no uncertain terms, the government wants an access point to spy on anybody who has an Apple device if the government finds the need to spy on that person.

cell phone hack

So far Apple has held its ground but don’t be so sure.  They could fold at any time but they are in a very precarious position.  On one hand Apple has the chance to follow the court order and assist in the break in of a terrorist’s phone which would be a great thing……But at what cost?  Personal privacy is on the line here.  Once law enforcement gets that encryption for the one phone do you really think it will stop there?  It will not.  Once this phone belonging to the terrorist is broken into, the encryption that millions have relied upon to keep their personal data safe will be toast!  This will first start being used in some other high profile cases that look good to the public.  Perhaps a murder, or a violent robbery will get solved.  Then the hack will find its way into local police stations around the country.

Somewhere along the way thieves and criminals will start stealing data and bank information from unsuspecting victims.  Keep in mind that the victims are part of the 90% idiots in the world that probably don’t even know this story exists and probably wouldn’t believe it if you told them.  These poor fools are going to have their bank accounts looted and their identities stolen by hackers and then it’s all going to be used to pay for more global terrorism.  This is why the phone situation should be left alone.

As always, I want to give you the best piece of advice I can offer:  Don’t do anything on an electronic device that you wouldn’t want to explain on national television or to a jury.  Apple may cave and give it all up.  This may hurt their street cred but with the right amount of pressure from the government they will drop the dime.  They may also try to save face and send the government a helper that has recently “resigned” from the company.  NEVER EVER EVER PUT YOUR FAITH IN THE SECURITY OF AN ELECTRONIC DEVICE.  You will be disappointed.