• 0 Posts
  • 18 Comments
Joined 10 months ago
cake
Cake day: June 25th, 2025

help-circle
  • It depends on what kind of devices you’re using.

    It’s my understanding that SIM cards in phones are just to tie an account and identity to your phone, for purposes of enforcing people to be paying customers for the phone/data services, and tracking your usage based on what level service you’re paying for and what you should receive (5GB of data monthly, unlimited texts, etc)

    But if your phone doesn’t have a SIM card in it, its still connecting to cell towers for purposes of emergency dialing, and the phone itself can continue to be tracked by cell carriers based on what physical cell towers its connecting to, as you travel around. The cell phone modem itself can control and connect to networks independently of what the OS running on the phone tell it to do, its a self contained black box.

    If you have something like a desktop or laptop, both Intel and AMD have “management engines” embedded in the CPU’s themselves that can take control of the device for purposes of shutting down, wiping, etc a company machine that has sensitive information or access on it, and has been reported stolen, not returned by an ex employee, etc. These management engines have direct access to the network stack and can phone home whenever a network connections is present, either from a WiFi network, physical Ethernet cable, or 4G/5G WWAN card.

    https://en.wikipedia.org/wiki/Intel_Management_Engine

    If you have a device that is basically air gapped, no WiFi, no cellphone chip, no bluetooth, etc, than it’s still possible to exfiltrate information off the device, but the software running on the device would have to be programming to be searching for methods to do that. Your average device, unless it’s running malicious software, probably won’t be doing that.





  • I guess it’s easier packaged in a torrent rather than individual downloads, but I do question why anyone would need this if all they were doing was training AI, as everything is already available on YouTube for free. You don’t need to hack a company to get the audio. Now if you’re a human trying to actually listen to the songs, obviously the Spotify torrent will sound much better, assuming the hack captured the higher quality audio streams from Spotify. All the youtube downloaders sound like crap because its like 128kbps m4a (at least on newpipe, though you can do 160kbps opus if you want)


  • Its all fine until their approach of privacy or security differs with what’s best for the project, then there’s no reasoning with them to fix it because they’re not calm and flexible. Then ya gotta fork it and get everyone to transition to the new fork, and get developers back onboard, etc.

    A crazy, but pointed example of something like this could be: the dude could just claim grapheneos going forward will not have networking anymore because thats an attack vector, and at that point the project doesn’t even suite anyone’s needs to be used as a smartphone anymore. How are you gonna reason with someone like this that, while keeping networking in the project is an attack vector, its necessary to be able to use the project for it’s intended use case? You probably aren’t









  • Get back to us when your health insurance company kicks you off your plan because your car has been reporting that you’ve been going to the bar 4 nights a week.

    Or when your wife starts getting ads when connected to your home network for strippers and strip clubs because you parked the car near a strip club 1 time.

    Or when your car starts suspiciously routing you through weird routes on maps, that take you close to the local fast food joints because Taco Bell/KFC paid them advertising money.

    “But none of that happens right now!”

    That’s not the point. The point is, it could.

    “It was labeled as a technology platform, I didn’t think any of that technology would be used against me!”