bluedoves

joined 9 months ago
[–] bluedoves@monero.town 1 points 9 months ago

Author of the article I believe meant the end user was using a crypto-burner SMS verification, such as the ones on this list: https://simplifiedprivacy.com/burners/

Then combined with Tor is fully anonymous. It depends obviously on what you want to achieve

 

Travel routers with VPN or Tor allow you to avoid trusting the DNS from WiFi ISPs and cell phone towers. Some even let you plugin USB modems and switch MAC addresses to help bypass WiFi captchas on multiple devices. This article compares GL.inet to a Rasberry Pi with OpenWRT, and can give you some ideas for privacy and security for whatever choices you make:

https://simplifiedprivacy.com/glinet/

30
submitted 9 months ago* (last edited 9 months ago) by bluedoves@monero.town to c/privacyguides@lemmy.one
 

Overview of the pros and cons of some DeGoogled Phone operating systems/models such as:

Graphene, Calyx, Lineage, Pinephone, Purism Librem 5

Enjoy: https://simplifiedprivacy.com/degoogledphones/

 

What is Pegasus?

Pegasus is targeted cellphone malware by the NSO Group sold to governments. It’s regularly used against human rights activists.

How can you stop Pegasus?

https://simplifiedprivacy.com/pegasus/