In a document detailing several mobile device best practices, the NSA recommends users turn their devices off and then back on once every week to protect against zero-click exploits, which attackers often use to eavesdrop on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
In a document detailing several mobile device best practices, the NSA >recommends users turn their devices off and then back on once every week to >protect against zero-click exploits, which attackers often use to eavesdrop >on and collect data from phones. >https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
National Security Agency | Mobile Device Best Practices[end quoted excerpt]
Threats to mobile devices are more prevalent and increasing in scope and complexity.
Users of mobile devices desire to take full advantage of the features available on
those devices, but many of the features provide convenience and capability but >sacrifice security. This best practices guide outlines steps the users can take to
better protect personal devices and information....
In a document detailing several mobile device best practices, the NSA recommends users turn their devices off and then back on once every week to protect against zero-click exploits, which attackers often use to eavesdrop on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
On 5/31/2024 5:20 PM, Larry Wolff wrote:
In a document detailing several mobile device best practices, the NSA
recommends users turn their devices off and then back on once every week to >> protect against zero-click exploits, which attackers often use to eavesdrop >> on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
https://www.forbes.com/sites/daveywinder/2024/05/31/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/?sh=6b10c53e7c75
"Users can mitigate the threat of spear-phishing, which can lead
to the installation of yet more malware and spyware, by the same
simple action. However, the NSA document does warn that the
turn it off and on again advice will only sometimes prevent
these attacks from being successful.
"
I wasn't feeling very safe today, but now, after a few simple
ritual sacrifices, everything is OK again.
I'm glad this was explained so ordinary users can follow the logic.
I thought we only went "spear-phishing" on dive trip.
*******
For those users at home, wishing to ritual sacrifice, the steps are:
1) Select "Shutdown" from the power menu in your OS.
2) When the fans stop, switch off at the back. If the machine
has no switch, you could unplug the power cable leading to the
ATX supply.
3) Wait at least 60 seconds (inrush limiter cools off etc...) .
4) Plug in, turn on power switch at the back.
5) Push the button on the front and do a normal bootup sequence
like you do every morning or whatever.
Have the evil spirits left the room ?
I would need a psi meter to check.
Maybe a little cleansing with DISM and SFC would help.
Or a Repair Install. I did a Repair Install on my laptop yesterday,
and as a bonus, the thing put my WinRE on the wrong partition :-)
(I had to hunt around to verify that, as I couldn't believe what
I was seeing, but it really was on the wrong partition.)
Then 5034441 installed itself without a fuss (still on the wrong partition
of course). It ignored the partition I provided for it.
That's proof I enjoy a ritual just as much as the next user.
Paul
On 2024-05-31 14:20, Larry Wolff wrote:
In a document detailing several mobile device best practices, the NSA
recommends users turn their devices off and then back on once every week to >> protect against zero-click exploits, which attackers often use to eavesdrop >> on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
Got any proof that document was created by the NSA?
In a document detailing several mobile device best practices, the NSA recommends users turn their devices off and then back on once every week to protect against zero-click exploits, which attackers often use to eavesdrop on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
That link could be doing anything.
You could have protected people from that risk. The actual PDF is
here:
https://s3.documentcloud.org/documents/21018353/nsa-mobile-device-best-practices.pdf
Larry Wolff wrote:
the NSA recommends users turn their devices off and then back on
once every week
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Got any proof that document was created by the NSA?
I'd suggest that if you care about security online then you might
want to go into your browser settings and change the default behavior
for PDF files -- set them to be downloaded.
That link could be doing anything.
Well, any link can do anything ...
You could have protected people from that risk. The actual PDF is
here:
https://s3.documentcloud.org/documents/21018353/nsa-mobile-device-best-practices.pdf
That's just a different link to the same site
I posted a link to the
original file (which could also do anything) but presumably you accept a
DoD website is less likely to do anything "bad" than a .org website?
It's in all the major papers so there's no need, really, for the PDF. https://www.forbes.com/sites/daveywinder/2024/06/01/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/
Larry Wolff wrote:Agreed; it's the equivalent of people thinking that because they check
https://www.forbes.com/sites/daveywinder/2024/06/01/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/
And it's useless info.
Newyana2 wrote:
Larry Wolff wrote:
https://www.forbes.com/sites/daveywinder/2024/06/01/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/
And it's useless info. > Agreed; it's the equivalent of people
thinking that because they check their > tyre pressures once a week,
they can drive anyhow they like ...
Agreed; it's the equivalent of peoplehttps://www.forbes.com/sites/daveywinder/2024/06/01/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/
And it's useless info.
tyre pressures once a week,thinking that because they check their
they can drive anyhow they like ...
Why would anyone think that? The news article says "However, the NSA
document does warn that the turn it off and on again advice will only sometimes prevent these attacks from being successful."
It's good advice, but it won't safe you from everything, it's a
mitigation, that's what it says in the article.
Why would anyone think that? The news article says "However, the NSA
document does warn that the turn it off and on again advice will only sometimes prevent these attacks from being successful."
On 2024-05-31 23:27:42 +0000, Paul said:
On 5/31/2024 5:20 PM, Larry Wolff wrote:
In a document detailing several mobile device best practices, the NSA
recommends users turn their devices off and then back on once every week to >>> protect against zero-click exploits, which attackers often use to eavesdrop >>> on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
https://www.forbes.com/sites/daveywinder/2024/05/31/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/?sh=6b10c53e7c75
"Users can mitigate the threat of spear-phishing, which can lead
to the installation of yet more malware and spyware, by the same
simple action. However, the NSA document does warn that the
turn it off and on again advice will only sometimes prevent
these attacks from being successful.
"
Oh dear ... more utter bollocks from the looney conspiracy nutter trolls. :-\
I wasn't feeling very safe today, but now, after a few simple
ritual sacrifices, everything is OK again.
I'm glad this was explained so ordinary users can follow the logic.
I thought we only went "spear-phishing" on dive trip.
*******
For those users at home, wishing to ritual sacrifice, the steps are:
1) Select "Shutdown" from the power menu in your OS.
2) When the fans stop, switch off at the back. If the machine
has no switch, you could unplug the power cable leading to the
ATX supply.
3) Wait at least 60 seconds (inrush limiter cools off etc...) .
4) Plug in, turn on power switch at the back.
5) Push the button on the front and do a normal bootup sequence
like you do every morning or whatever.
If you're booting your device every morning, there's no need to follow
this supposed "advice" anyway.
Have the evil spirits left the room ?
I would need a psi meter to check.
Maybe a little cleansing with DISM and SFC would help.
Or a Repair Install. I did a Repair Install on my laptop yesterday,
and as a bonus, the thing put my WinRE on the wrong partition :-)
(I had to hunt around to verify that, as I couldn't believe what
I was seeing, but it really was on the wrong partition.)
Then 5034441 installed itself without a fuss (still on the wrong partition >> of course). It ignored the partition I provided for it.
That's proof I enjoy a ritual just as much as the next user.
Paul
Alan wrote:
Larry Wolff wrote:
the NSA recommends users turn their devices off and then back on
once every week
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Got any proof that document was created by the NSA?
Here it is from a .gov site
<https://media.defense.gov/2021/Sep/16/2002855921/-1/-1/0/MOBILE_DEVICE_BEST_PRACTICES_FINAL_V3%20-%20COPY.PDF>
In comp.mobile.android, on Sat, 1 Jun 2024 18:39:05 +1200, Your Name <YourName@YourISP.com> wrote:
On 2024-05-31 23:27:42 +0000, Paul said:
On 5/31/2024 5:20 PM, Larry Wolff wrote:
In a document detailing several mobile device best practices, the NSA
recommends users turn their devices off and then back on once every week to
protect against zero-click exploits, which attackers often use to eavesdrop
on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
https://www.forbes.com/sites/daveywinder/2024/05/31/nsa-warns-iphone--android-users-to-turn-it-off-and-on-again/?sh=6b10c53e7c75
"Users can mitigate the threat of spear-phishing, which can lead
to the installation of yet more malware and spyware, by the same
simple action. However, the NSA document does warn that the
turn it off and on again advice will only sometimes prevent
these attacks from being successful.
"
Oh dear ... more utter bollocks from the looney conspiracy nutter trolls. :-\
You do know that the NSA does a lot of the US's spying, and they are
also spied upon a lot. Do you think they don't a lot about spying?
Next time you're in Maryland, you can go to the NSA Museum.
On 6/1/2024 3:15 PM, Richmond wrote:
Why would anyone think that? The news article says "However, the NSA
document does warn that the turn it off and on again advice will only
sometimes prevent these attacks from being successful."
Do you know how that's so? I didn't see any version of this news
that explained the claim. Spearphishing has nothing to do with
resident malware. And the rest of the advice is mostly things
that few understand and fewer would do.
I'm all for better security on cellphones, but to my mind this
is just an example of how the mainstream media feeds the public
any old clickbait, but avoids actually printing useful information.
If they did then no one would read their stuff. That's why they're
the *mainstream* media. This case was a perfect example.
Forbes took a half-baked, entirely unexplained graphic from
the NSA -- probably intended for agents -- and reduced it to
"NSA Warns iPhone And Android Users To Turn It Off And On Again".
People read that and, like you, think they've learned how to
protect their phone from attacks with a nearly effortless trick.
It's like the way that privacy articles always tell us to delete
cookies once in awhile. That advice is not wrong, but it misleads
people into thinking they understand the issue when they really
don't.
The news article says "The NSA also advises Phone users to disable
Bluetooth when not using it" but isn't Google and Apple keeping the
bluetooth radio permanently on because they want to sell trackers?
Why would a radio be bluetooth? Does anyone actually use separate
radios now? And if they did, why would they want it to play through
their phone? Or is it the radio on the phone playing through bluetooth speakers?
So, Google and Apple are tracking location. Google is also buying
credit card data and cooperating with stores to know when you're
actually within a store's building. Apps are spying and selling location data. Bluetooth, then, is just adding finer data to the mix. Now they
know you're in the produce aisle or looking at pasta.
Why would a radio be bluetooth?
which Google & Apple both have a vested
interest in making easily trackable by not allowing you to keep them off.
which Google & Apple both have a vested
interest in making easily trackable by not allowing you to keep them off.
Can you cite a reliable source for this?
Radio spectrum stretches from 30 Hz
Radio spectrum stretches from 30 Hz
ELF says "hold my beer". It says it quite slowly, mind.
So since I always turn my phone and computer off (along with the lights,
TV, radio...) when I go to bed I should be safe, right?
I think the intention is to get you away from whatever app is displaying
the pop-up.
Back then, many phones still had physical areas dedicated to triangle=back/circle=home/square=app-switcher
Now they've either been replaced with soft areas, or removed altogether
in favour of gestures.
Andy Burns wrote on Sun, 2 Jun 2024 08:34:28 +0100 :
I think the intention is to get you away from whatever app is displaying
the pop-up.
Back then, many phones still had physical areas dedicated to
triangle=back/circle=home/square=app-switcher
Now they've either been replaced with soft areas, or removed altogether
in favour of gestures.
More and more, I find that obnoxious apps don't provide the bottom triangle/circle/square which bother me as they at the same time don't
supply any quit/exit/back button within the displayed app activity.
I don't agree with "gestures" so I never studied them, and as a result of
my ignorance of gestures, I end up swiping about (almost willy nilly) until the bottom triangle/circle/square returns.
It would be nice if there's an app to force the triangle/circle/square to stay put in all activities. Do you think that's even possible to set up?
The art/science is still relatively new, gestures SUCK [...]
bad sector wrote:
The art/science is still relatively new, gestures SUCK [...]
[...] until you get used them after which, gestures RULE.
I do realise there are people with e.g. dexterity issues where gestures
may not be the answer, but have you given them a *serious* go for a few
days, they just become 2nd nature and you'll never want to see square/circle/triangle again ...
bad sector wrote:
The art/science is still relatively new, gestures SUCK [...]
[...] until you get used them after which, gestures RULE.
I do realise there are people with e.g. dexterity issues where gestures
may not be the answer, but have you given them a *serious* go for a few
days, they just become 2nd nature and you'll never want to see square/circle/triangle again ...
Alan Browne <singularity@blackhole.org> wrote:
which Google & Apple both have a vestedCan you cite a reliable source for this?
interest in making easily trackable by not allowing you to keep them off. >>
Not only is it well known information, but there were already reliable sources previously cited in this very thread by Newyana2, which you
shouldn't be asking me to repeat just because you didn't bother to look.
On Sat, 1 Jun 2024 22:37:15 -0700, The Real Bev wrote:
Why would a radio be bluetooth?
There are probably five to ten different radios on any given smartphone.
Radio spectrum stretches from 30 Hz to 300 GHz. The lower the frequency the >longer the range. However, the lower the frequency the lower the data rate
it can support. As a result, selecting a radio spectrum comes with
tradeoffs between range and data rate.
Bluetooth technology uses the 2.4 GHz ISM spectrum band (2400 to 2483.5
MHz), which enables a good balance between range and throughput. In
addition, the 2.4 GHz band is available worldwide, making it a true
standard for low-power wireless connectivity.
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/range/
which Google & Apple both have a vestedCan you cite a reliable source for this?
interest in making easily trackable by not allowing you to keep them off. >>>
Not only is it well known information, but there were already reliable
sources previously cited in this very thread by Newyana2, which you
shouldn't be asking me to repeat just because you didn't bother to look.
I think that's a reasonable question. I can turn off my
Android cellphone, and I do. If it's really true that phones
are now being made that can't be powered down, that's
shocking and nonsensical. Not that I don't believe it, but
I'd like to know the facts one way or the other. If that's really
the case then I suppose the only way to stop tracking
would be too keep the phone in something like a metal
cigarette case.
If it's really true that phones
are now being made that can't be powered down, that's
shocking and nonsensical.
Wishy-washy "gestures" with zero visual guidance are incredibly silly
and user-UNfriendly. An actual button (whether physical or on-screen)
that you can see will always be a far far better method.
Chris wrote:
Peter wrote:
2. The bluetooth radios turn back on despite you turning them off.
Not true on ios. You can turn it off permanently.
The auto turning back on is only present in Android 15, which isn't out
of beta yet, things could change.
If people want to disable these new features, that's fine, but it should prevent them from benefitting from the new features. If you don't want
to contribute to the findmydevice network that's OK, but don't expect to
be able to use the findmydevice network when/if you lose your own phone ...
A phone is a commodity, which most of us get for free or for extremely low costs (e.g., T-Mobile gave everyone in the USA on their postpaid plan a
free phone who wanted it - see my note below copied in the sig proving it).
If we lose it, big deal. We lose a free phone. There's no real loss there.
My point only is that this doesn't portend an ability to turn off bluetooth in later releases because Google & Apple make too much $ off tracking us.
The auto turning back on is only present in Android 15, which isn't out
of beta yet, things could change.
If people want to disable these new features, that's fine, but it should prevent them from benefitting from the new features. If you don't want
to contribute to the findmydevice network that's OK, but don't expect to
be able to use the findmydevice network when/if you lose your own phone ...
If we lose it, big deal. We lose a free phone. There's no real loss there.
They may give you a cheap/free phone when it suits them, but if you lose/break it, will they replace it cheaply when you need it?
My point only is that this doesn't portend an ability to turn off bluetooth >> in later releases because Google & Apple make too much $ off tracking us.
But do they really make money from knowing where I am?
If I actively search for a supermarket or petrol station, usually I want results near me, occasionally I'm interested in a remote location and
can let it know.
I'd be more convinced if every time I came with 50 ft of a Starbucks/McDonalds/Wetherspoons, my phone got bombarded with special
offers to lure me in ...
I would edit shutdown to a full reset+tweakathon once a monthMy phone gets a security update (and hence restart) every month, also
Google's "Find My Debvice Network" by Stan Brown (4 days ago) https://comp.mobile.android.narkive.com/5eS53TT8/google-s-find-my-debvice-network
One relevant post with a cite showing the phones never turn off being this.
"thanks to specialized Pixel hardware, Pixel 8 and 8 Pro owners
will also be able to find their devices if they're powered off
or the battery is dead"
<https://blog.google/products/android/android-find-my-device/>
In that same thread is another cite about bluetooth turning back on.
"Android 15 will add a new feature that can automatically turn
on Bluetooth the day after you've disabled it.
Your phone's Bluetooth radio is used for several key Android features,
such as Quick Share and Find My Device.
Disabling Bluetooth will slightly improve battery, but the trade-off
is that your device won't be able to contribute to Google's Find My
Device network."
<https://www.androidauthority.com/android-15-bluetooth-auto-on-3431445/>
Newyana2 wrote:
If it's really true that phones
are now being made that can't be powered down, that's
shocking and nonsensical.
To be clear, certain parts of them can remain on while the majority of
the phone is definitely off.
In a document detailing several mobile device best practices, the NSA recommends users turn their devices off and then back on once every week to protect against zero-click exploits, which attackers often use to eavesdrop on and collect data from phones.
https://www.documentcloud.org/documents/21018353-nsa-mobile-device-best-practices
Does this advice hold true for PC's also?
In comp.mobile.android, on Sat, 1 Jun 2024 14:18:49 +0100, Andy Burns <usenet@andyburns.uk> wrote:[...]
<https://media.defense.gov/2021/Sep/16/2002855921/-1/-1/0/MOBILE_DEVICE_BEST_PRACTICES_FINAL_V3%20-%20COPY.PDF>
very intesting. Especially:
Unexpected pop-ups like [the one shown] are
usually malicious. If one appears,
forcibly close all applications
(i.e., iPhone®2: double tap the
Home button* or Android®3:
click “recent apps” soft key
I guess Android®3 is from long ago, but perhaps it's still true, that tapping the “recent apps” soft key will close all applications!!! ?????
And the “recent apps” soft key is the square symbol at the bottom, is that right?
Andrew wrote:
My point only is that this doesn't portend an ability to turn off
bluetooth
in later releases because Google & Apple make too much $ off tracking us.
But do they really make money from knowing where I am?
Andrew wrote:
My point only is that this doesn't portend an ability to turn off bluetooth >> in later releases because Google & Apple make too much $ off tracking us.
But do they really make money from knowing where I am?
Your Name wrote:
Wishy-washy "gestures" with zero visual guidance are incredibly silly
and user-UNfriendly. An actual button (whether physical or on-screen)
that you can see will always be a far far better method.
Depends on the device, I won't be buying a car that requires use of a
touch screen, let alone gestures, give me physical buttons.
But for a phone/tablet that is handheld, and already uses a touch
screen, I have no problems with gestures.
Yes. Yes. Yes. Yes. Yes. You need to remember that GoogleMy point only is that this doesn't portend an ability to turn offBut do they really make money from knowing where I am?
bluetooth
in later releases because Google & Apple make too much $ off tracking us. >>
and Apple are both running their own ad systems. For Google,
spyware and ad middlemanning is essentially their whole business.
Google operates by vast, comprehensive data collection. Apple
operates via spyware combined with control over devices.
I don't mind, for example, that the contacts sqlite database is uploaded by every prole out there who does exactly what marketing tells them to do, as long as I can operate my phone independently of a contacts sqlite database.
<https://xdaforums.com/t/privacy-does-android-upload-your-home-ap-ssid-bssid-gps-if-the-home-ap-broadcast-beacon-is-hidden.4284897/>
Nowadays location based services are of course more often used to
distribute advertisements or to determine good locations to open the
next fast food restaurant etc..
Which are reasonable and acceptable use cases. "Andrew "is insinuating more nefarious data capture.
My point only is that this doesn't portend an ability to turn off bluetooth >>> in later releases because Google & Apple make too much $ off tracking us. >>But do they really make money from knowing where I am?
Yes. Location based services where already a business model before we
had smartphones.
Let's be clear that a subtle portion of my rant against Apple's and
Google's brazen lies as to *why* they're preventing us from turning off our tracking radios is partly that the morons (who outnumber the intelligentsia 1000 to 1) are also tracking us - which is easy to prove with Wi-APs.
If it's really true that phones
are now being made that can't be powered down, that's
shocking and nonsensical.
To be clear, certain parts of them can remain on while the majority of
the phone is definitely off.
By which you mean a homing beacon to enable the cootie
tag function? Then again, if there's only a homing beacon
the phones turned off can't function as part of the network
of cootie tag trackers. This has got me curious to look up
how it actually works. The media seem to be specculating as
much as we are.
I don't know how they do it, but there's no way they can do it without indicating that the phone is off, when it's not really off at all.
My only goal, really, is to be able to turn that stuff off.
That's it.
My only goal, really, is to be able to turn that stuff off.
That's it.
What happens if you wrap your phone in tin foil? (seriously). If I put
my phone in a tin it will only ring if wifi calling is enabled.
Peter wrote:
I don't know how they do it, but there's no way they can do it without
indicating that the phone is off, when it's not really off at all.
The bluetooth radio will have its own microcontroller (possibly even a
full ARM CPU) supposedly the main phone CPU will pre-compute encrypted
FMDN beacon packets before shutting down, which the bluetooth radio will
then "chant under its breath" until the battery dies, without needing
the phone O/S to be running
Newyana2 wrote:
How does that compare to Apple tags? The implication of
your description would be that the cellphone only transmits where
it was at time of shutdown.
It doesn't transit a location, just an encrypted ID, it's left for
a.n.other android device which "hears" the transmission to report where
it was when it heard the ID being transmitted.
That's similar to how Apple SmartTags work, I believe.
But how likely is it that an iPhone happens to be turned on within
yards of that storage garage? Or maybe all iPhones are reporting
whatever they come across, and someone with an iPhone happened to
walk past that garage last week?
The airtag is battery powered and whenever
an apple device (and now google) passes by it logs what it has seen and where. The mobile device doesn't even need to have a live data connection
as it'll upload its sightings the next time it is online.
But it seems that they will operate as two isolated sets of devices,
iphones only reporting "findmy" devices and android phones only
reporting "findmydevice" devices.
The only functionality they will share is warning of devices that are travelling with you, yet separated from their owner (i.e. being used as stalking devices).
What did you learn by reading the reference you were supposed to read?
<https://xdaforums.com/t/privacy-do-you-know-a-way-to-permanently-disable-google-location-accuracy-precise-location-wi-fi-scanning-while-keeping-only-the-gps-radio-on.4543135/>
You mean the reference you wrote? I'm not going to anything I don't already know.
I don't want to be in either Apple's or Google's findmy(device) databases. Any advice there?
I don't want to be in either Apple's or Google's findmy(device) databases. Any advice there?
I don't want to be in either Apple's or Google's findmy(device) databases. >> Any advice there?
Not so far, but today I installed nRFConnect
<https://play.google.com/store/apps/details?id=no.nordicsemi.android.mcp>
to see how many BLE beacons are floating around, so far fairly quiet
here, one FitBit Versa, one unknown HP device, one Apple iBeacon and a Stanley B&D Oven ... none of which are mine.
None of my own devices have shown up.
To do that is simple: *Answer this fundamental question*.
Why has Google unilaterally made it so that you can't do routing
without turning on the Wi-Fi "precise location" when GPS worked just
fine for decades?
Before you answer that, read this directly related reference please. <https://xdaforums.com/t/privacy-do-you-know-a-way-to-permanently-disable-google-location-accuracy-precise-location-wi-fi-scanning-while-keeping-only-the-gps-radio-on.4543135/>
Then answer the basic and rather simple fundamental question please.
Andrew wrote on Mon, 3 Jun 2024 20:13:28 -0000 (UTC) :
Let's be clear that a subtle portion of my rant against Apple's and
Google's brazen lies as to *why* they're preventing us from turning off our >> tracking radios is partly that the morons (who outnumber the intelligentsia >> 1000 to 1) are also tracking us - which is easy to prove with Wi-APs.
I belatedly realized I hadn't backed up that claim, but since only 1 out of
a million people know this information, here's the backup reference cite.
<https://xdaforums.com/t/privacy-does-android-upload-your-home-ap-ssid-bssid-gps-if-the-home-ap-broadcast-beacon-is-hidden.4284897/>
Andrew, 2024-06-04 07:19:
Andrew wrote on Mon, 3 Jun 2024 20:13:28 -0000 (UTC) :
Let's be clear that a subtle portion of my rant against Apple's and
Google's brazen lies as to *why* they're preventing us from turning
off our tracking radios is partly that the morons (who outnumber the
intelligentsia 1000 to 1) are also tracking us - which is easy to
prove with Wi-APs.
I belatedly realized I hadn't backed up that claim, but since only 1
out of a million people know this information, here's the backup
reference cite.
No - hiding an SSID does *NOTHING* for privacy when you *use* a WiFi
network! The SSID is *alway* visible for connected devices, even when
it is "hidden".
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 361 |
Nodes: | 16 (2 / 14) |
Uptime: | 123:21:00 |
Calls: | 7,716 |
Files: | 12,861 |
Messages: | 5,727,955 |