@@Mr.Robert1 Rob's social network is Brax.me where you can look in the STORE for a place to donate directly to Rob. Brax. me only requires a password and username for signup. (Your email will never get nagged if you choose to provide it to Brax.me for account recovery purposes.)
Rob: You are a brilliant guy who understands this technology and can explain it to us mortal humans. Thanks for your service to everyone valuing privacy! - Jim
When the numbers are low you know the video will be filled with lots of great information. It's funny how some of the most informative videos are the ones that nobody watched.
Wow this is just what I was trying to figure out it seems you covered my question for the most part years ago lol. Thanks for all that you do and please keep up the great work.
While no sim card will eliminate many ordinary cell interactions, I am pretty sure I doesn't preclude the baseband modem from communicating with cell towers or impersonators. For some time now I am living without carrying a device around.
Only a baseband with a SIM will have "interactions". So in this example, I isolated it to a dedicated Netgear which has no other function. This is explained in the last video on Backdoors
@@robbraxmantech I use my phones without simcard (exept 1 for communication only ) the others are regularly on the internet via wlan ..used for gaming and my android channel .. If I talk about something privat I put the phones out of Listening reach ..cameras are glues shut . I don't have any smart devices .. I use a computer and some consoles but those are 90% of time unplugged and if on only used for gaming and yt too ... I have never use online banking and don't buy stuff over the web .. Those informations are well known which means its no problem to write here .. What do you think ? Is that a at least considerable safe way to use big tech? Or am I totally wrong ?
@@AndroidFerret I think the most practical approach is to both understand the threats and set goals according to them. There are things that are worth keeping out of "big tech" hands, and there are things big tech thinks are worth having but it is just collecting because it is a digital hoarder. The system knows you exist. The various companies build profiles on everyone and they try to fill in data as they can. It is technically possible, for example, to use the FPGA on cell phones for speech to text and to be continually building an index of spoken terms and to trigger recording when a person's name comes up, then upload that to the dossier for processing. There are all manner of ways of indirectly collecting information on people. That type of system could, at least in theory, be entirely automated by algos intended to fill dossiers using the means available. Most people don't understand the power in their phone. It's exceptionally difficult to be completely outside the view of tech and it is best in my estimate to conserve that effort for things you want to be outside big tech. For example, I bought a refrigerator one year and they ended up selling a model they no longer had, somehow, and refunded me the difference between it and the model I selected in cash (because of how the debit I paid in works). That cash conversion is completely outside banking records. It's an ATM withdrawl without an ATM record. Cash-back can work in a similar manner, as far as bank records go. That is cash the system doesn't know you have available. The same can be said for any personally sold items. This cash can then go toward activities you'd prefer the system not have a record of. Unless I have something specific to secure or need to be unfindable for a period of time, I tend to have a rather modest effort on avoiding tracking. ... there again, I have direct family with Yankee White clearances and others who have TS clearances who built a numer of ELINT systems (and some others). I have owls in my trees and sometimes I enjoy playing gross-out with them.
I would be very interested in seeing a video that discusses solutions and various possible set-ups for people choosing to use old, no-internet, flip phone. So only having a computer at home and using it as the only internet connection, in today's world. I'm in France and many people are choosing to not have a smartphone at all.
The companies should be supplying the devices if they want the mass surveillance system operational and have control of everyone's personal lives which social media accounts determine credit outcomes without needing to explain. I have spend thousands on devices which have been controlled by a person I have discovered over the years ,narcissism used to be addressing these people as control frieks which accepts the unacceptable unaccountable Narcissistic Personality Disorder. Im the targeted Australian who is ignored as I have been getting angry at my server because I keep getting investigations opened which close days later without contacting me. This is because my stalkers have authentication malware and Telstra investigations are controlled by him. An example of the system failure. If I threatened anyone, the police would actt instantly. Instead of waiting for someone to do something stupid due to this constant server timed out on phone. Dynamic Host Configuration services is every single devices configuration, he literally won't allow me to type. Sorry about the book, it been your channel that's helping most with your quiz, helping. I just want to control my device without having him fighting my devices as he hasn't hacked me, he's using malware and he new me for years but not well obviously, he was always overly friendly which I now know was just FAF. FAKE
I don't know how you can remember all this stuff and have it at your fingertips - I never could. I guess you must be an olympic standard tech guy. Thanks Man
everyone who makes high content videos has it planned out what they're going to say, probably written in notes they can use like a tele-prompter. But yes, Rob KNOWS all this stuff!
Have been using a lower end android phones without SIMs to store , 2FA apps and net banking stuff, etc. Something one can leave at home, find easily and use just when one needed and keep a bare minimum apps installed.... Less risk than keeping credentials on your "normal use" phone an less inconvenience if the normal use phone is lost.
Or you could do what I do & Extend the size of my pockets. I essentially just cut the seams on inside of my pockets &resew it W/ a Zipper. &Outside of the Default Pocket I make a larger enclosed pocket area, I can access if I need more room. (&Not if I don't wanna have 2reach down 2my knees too retrieve my phone or whateverrr) I also wear Cargo Pants tho actually.. I just modify them like thatt ha
Much of this video was involved with how to use a phone with privacy, which I'm not interested in. Haven't used a phone in years. But lots of good info. Thanks.
I rarely use my phone as an actual telephone. Usually only to call my wife about mundane stuff. I've got a Pinephone and really like it, minus a few issues. I dock it to a monitor and keyboard and use it at my workplace as a "stealth" personal computer (they would look at me funny if I lugged in my own personal laptop... but never notice a phone). The only problem I have with that is my Pinephone looses its data connectivity in that mode for some reason. (I don't connect it to the corporate WiFi -- that's the point using it). So I have to tether it to the Android phone I still carry. Hopefully soon I'll have a solution and I can switch the SIM back to the Pinephone. I actually watched this video and I'm commenting now using the Pinephone! (EDIT: Great video as usual, Rob!)
Wouldnt it be funny if there was a coordinated phone swap program where everyone in a city or state just swapped phones and kept pay the bills then the carriers wouldn't have a clue who had what phone lol. That would confuse the hell out of big tech, do the swap once a month and keep doing it until all their collected data is useless
great idea!! But someone would stop paying their bill on the phone you have when they lost or damaged the phone they happen to have. That might work better in a small town where everyone knows everyone else.
Excellent, not funny. It is going to take this kind of creative thinking to break the almost total control they now have of what are supposed to be OUR PERSONAL COMPUTERS!
The biggest problem with this idea is that you'd have no idea what number to call to reach someone. If you have several family members on the same plan, you could do this within your family. If you had say four phones of the same type, you could put a different colored case on each one, then send out a group text each day identifying which phone went with which person (using a private code to identify each person). The text could be something like "alpha-blue, bravo-orange, charlie-black, delta-green" and by that, you would know who was using each phone. To further obscure the data, anytime you send a text message, send it to the group rather than an individual so that "they" don't know the intended recipient. Another idea is to add an extra phone or two to the plan, so not every phone is used by someone every day.
@@FarmRanchHomestead If you have 6Family members on a Plan regardless if you switch phone or not the company will still have the names and information of those on the Plan.
Excellent video! easy to follow, everything explained and understandable, with in depth review of pro's & con's. Much respect to you my friend! I appreciate all the content you publish. time to get myself one of your de-googled phones!
New subscriber, find your lectures very interesting and understandable and I appreciate you targeting the non-IT person. Suggestion: when you consider VOIP devices there are those of us who want to connect it to a homes conventional telephone wiring and use conventional landline touchtone phones. Look for devices that supply dialtone and generate ringing current (90v 20Hz).
Thank you for watching! When plug a standard phone into Telco wiring then that is straight voice into PSTN. It is not digital. So that is not VOIP. Only your telco can deal with that. VOIP is specifically about using the Internet.
@@robbraxmantech My current cable modem has a telephone wire that plugs into the wall. As a result any phone in my house connected via a standard telephone wire on the wall in each bedroom has the phone services channeled through the cable modem. I plug in standard phone into the wall; they have dial tone; but going over the cable modem. Isn't this setup called also called VOIP?
@@akayla5435 phone that connects with cable modem are digital and hence can do VOIP calls regular landline that do not connect to internet do not offer VOIP
SIM has to be the biggest backdoor that you have zero control over. I've been saying this since I first started watching your channel. SIMs are more often than not have your real world identity tied to them.
When I was young, I got an unlocked phone with the idea of getting service later. I never bothered - and with all the tracking, battery drain and problems it causes, now I'm proud to use airplane mode full-time.
i am always on airplane mode but when i dialed 911 i got connected despite my sim card was removed. i had to remove some apk app from my phone using adb command
i used a magic jack when i lived in the Philippines so i would have a USA phone number. before i moved to Philippines i used a Vonage to talk to my Fiancee NO internet. previously used Skype but i thought that SUCKED! i really enjoyed this video!
Have been doing this (no simm in smartphone) since lockdown and discovering your channel/the depths of the data breaches. Still have sim in Nokia 8210 needed for business, don't miss the smartphone at all on road.
@@robbraxmantech very true mine is only 2g which is still fully available here in the UK. I was using the Nokia 106 still 2g before but the 8210 is last phone here before cell to cell tracking technology appeared.
I use visible wireless as my internet. I tether my phone via usb to my ubuntu PC. I have an old wifi router that I connected my magic jack and wall phone to it. I have the magic jack app on my phone for when I am mobile. I really enjoyed your video. I just can't use a data only modem with visible wireless but it would make my setup even better than it is.
Really nice video. I didn't think about the portable router and degoogled phone running a VPN combo. That looks like a viable daily driver especially if you carry a backpack or tactical bag.
Paired with a small "solar generator" this could be a portable solution that works wherever a usable cell signal is available. A briefcase, bag, or backpack would be needed to carry it all, but all these devices could be built onto a board or backplane that would keep them tidy.
They still know where you are based on what tower the LTE connects to, and where your packets are being routed from, and if they know either endpoint of a communication, traffic analysis tells them the other endpoint, even if it's encrypted. You can bet there is traffic analysis happening around TOR nodes, etc. The only way to obscure communications is an independent network which cannot be monitored, or an encrypted cloud which is constantly sending noise packets to all nodes so communication appears the same as no communication to traffic analysis.
Ron: I have an old Tracfone flip phone and only turn it on when I'm using it, so most of the time it's turned off and put away. I do not own any kind of "smart phone" basically because I hate talking on the phone. How secure privacy-wise is it?
The CST call audio, SMS text, and E.164 ("telephone") and IMEI numbers, and call duration, and distance to cell towers, are probably being recorded for both/all parties involved in any uses of the device. (And the phone might still ping cell towers sometimes, when powered off, as long as the battery is inserted - but you'd have to test that with radio-frequency sensor.) And all of that is easily correlated with the banking identity of the customer, if you're not paying cash for your airtime-refill cards. But is any of that likely to adversely affect your life in any measurable way? Not really. :-) It's just our civic duty to feed the beast with data as little as practicable, as it were.
Jovan Pulitzer explained the panopticon with phone apps and how you're being monitored through back doors installed on apps in your phone that can't be deleted. no matter what you try to do. You try turning off notifications
@@robbraxmantech if you go to javon pulitzer's yt his video on a look behind the curtain. You get incredible insight on how apps are all connected. Jovan Pulitzer is the owner of cyber ninjas who currently just did the audit in Arizona. I think he invented barcodes or something.
@9:55 How can you use a messaging app with this since it requires an SMS verification code upon subscription? The missing link would be a wireless router that has SMS capability.
My dear friend your explanation was perfect. Only I could not catch up with all the gadgets. Electronics give me a headache. I'm still having problems to fully utilize my mobile phone. It is beyond me how can you use phone without sim card? Regards from EU. Joseph.
phone without a SIM card is simply the same as a tablet... as mentioned if you need calling or texting, you need other apps for that, instead of the phone app designed to make calls and sent text via the SIM card (connecting to cell towers).
I used to have a Verizon phone that did not have a sim card inside. I don't see why cellphone carriers have to bother with sim cards and the problems they cause when they already have the device I.D. of their customers with the phone number and account details stored on their database in order for the customer to use their sevices. If the phone was lost or stolen then it only needs to be deactivated by contacting the cellophone call provider on the internet. Hopefully future phone development will no longer require sim cards.
My carrier allows limited hotspot sharing, then throttles it back. I've been using my tablet as a hotspot until it runs out, then switching to my phone. The limit on data usage directly from my phone or tablet is much higher. So if I use the Netgear, does the cell phone company think it is hotspot sharing with the lower limit, or will it just be seen as if it were the tablet or cell phone data?
the best two techniques I have are: 1) use a sandbox/burner phone for home-only apps, and do not take it anywhere else unless off/battery removed, and in a Faraday bag. You may be able to get away with no SIM. 2) Turn off/remove battery on your everyday phone and carry it around in a Faraday bag unless you specifically want to be 'on the air' and contactable, or to make a call, etc. This should stop 90+ % of useless Trace-And-Trace CV19 threats. You may be able to get away with a dumb phone if you can restrict it to phone calls and texts.
That's an insane amount of spy work just so Google can't steal your personal information. Which demonstrates how bad things are. If you want privacy, you're assumed to be up to something. People don't understand how bad that is.
Good day sir, I just want to say thank you for all your efforts to inform us about the security challenges we face in the tech world these days. I have been interested in a "de-goggled" (intentional spelling, I seriously dislike google goggles) phone after watching your videos. My only question is if you know if anyone is working on a de-goggled handheld device that is equipped with a high-end camera and stylus? Really that's all I need. Thanks again for all you do. Shalom.
Please join the "Linux Chat" after joining Rob's social network and support site: Brax.me Or, you can ask your question again in the "New Users Lobby" once you get into Brax.me.
I survived for decades without any smartphone and didn't die. Must still be possible to do so. Rob is really good with getting around the big tech spy networks. It's just gonna get harder to be connected to the Internet and use a cell phone without big brother knowing your every move.
I never needed a phone either, until once my car broke down in the late evening. I had a heck of a time finding a place to make a call to the repair shop.
Our company in VietNam uses TP-Link to duplicate your proposal. Every one of our vehicles have these. I (a Boss type) have one on my (trousers) belt. Additionally, we also mount very low power GPS jammer up against each TP-Link modem so should there be any GPS receiver detect GPS - all our setups have the same false GPS locations! Remember to set up Media Access Control (MAC) addresses to control pirate users. Lastly, your WiFi equipped cell will NEVER become dated when carriers cut off 4/3G signals. :))
I am using a Google voip, Google voice, with a handset like the old days. It runs off of my wifi connection which I get from land to land receiver. This is because I live in a wifi reception hole that works just ok with a cell phone. Would the Google voice work as well as the omma? Not too tech savy so I don't think I get all the points you are making Rob.
I know this is an older video, but my experience with no sim card or cell provider access. Yes, they can still access the phone. I had moved to another provider and had installed the new sim card and had not unlocked the phone (which I outright purchased, but they still had it locked from that purchase point, why is that could be another question asked) I removed the sim card and was able to call the previous provider and get them to unlock the phone without having any sim card in it. All they needed was to verify the phones id. (I forget which one, but it was in the system settings [iPhone]) So if your not in airplane mode, it transmitting and receiving even with no sim card installed.
You are observant and correct, according to Rob in other videos about iphones. Perhaps, unknown to you, the phone you purchased had an e-SIM already installed that cannot be removed? Rob recommends using only degoogled Android phones and not iphones. iphones have a mesh network that connect even when there is no SIM in them and the iphone is powered OFF...ihphones cannot be "de-appled."
@@al-du6lb yes I know but airplane mode isn't going to stop the government from spying on you ... If you cannot physically disconnect the modem it can still be used to spy on you if it has a connection even though it's TS in airplane mode.
Can anyone advise? I just bought a de-googled phone suggested by Rob. My question is this: if I move the old sim card from my old android into the new phone, I presume that will mean my new phone is now tagged with all of the data processing collected by Google on my old phone? There are new google apps on the new phone. Only the old sim card. This may sound like a silly question but I am not in any way a device nerd. Is my phone privacy now compromised?
no, but you can reveal these connections by not using what Rob called: Browser Isolation. Meaning, giving each browser the means to cross-reference and index what the other providers are doing. (Don't use a gmail address on Amazon.com for instance.)
I'm interested in the Librem 5, bittium or metaZERO... just like lots of other folks, trying to get away from Apple/Google, perhaps de-Google phone is an option, but I'm very keen on the new blockchain phones coming out. I'm only just learning, any suggestions?? Thanks!!
Rob, what about just using a Blackberry. Sure with a SIM that security is lost but as to hacking and commercial tracking, isn't it pretty secure as the apps are limited and there is not Google Services running?
Hi Rob, VPN came up in a conversation today with another ham (was your ears burning). Will the BraxRouter be fast enough for me to remote work with? I am a full time remote .Net developer and do a lot file transfers and bring up a VDI machine (onsite VM). Looking at using the router on my boat and camper when traveling. PS: I might be connecting to a remove Flex-6400 for Ham radio too.
I am having best results with my own hardware and custom software security phones, which however are a costly solution. I started also to mechanically modify phones, in order to make them deaf, dumb and blind ... without headsets. Which isn't cheap either, and not so secure.
Prepaid plans (vs postpaid) allow to use whatever info you want... enter all fake info and it does not matter. Other benefit is they do not require a contract.
Just note, you might have to port forward for your ooma for stable calling connection. At least I did back in the day. Wasn't hard but should be mentioned for some.
Hey Rob, I want to buy one of your de-googled phones but I'm afraid I don't know enough to use it effectively without downloading the wrong thing and ruining all that investment... am I over thinking it or do you really need to have a minimum knowledge of the way cell phones are programed? Do you have technical support after purchase?
There's only one rule. Do not put anything from Facebook. Otherwise, if the app works, it is fine. Nothing from Google will run. But 90% of apps will work. The secret is the lack of identity. Just watch the De-Googled video
12:15 - Even I had to look this up so I'll post it for the benefit of less-technical users: _The PSTN is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators._ Which had confused me because I expected to hear CSTN, but I see PSTN is rather like saying "the Internet" and CST is more like saying TCP/IP.
When you say SIM card, does the exact same apply to eSIM? Can you specify advantages and disadvantaged of eSIMs, especially since you can get an eSIM data only service anonymously. What about the difference between an eSIM service that is data only VS an eSIM service that also offers a phone number and SMS service?
Mrs Richards: " I paid for a room with a view!" Basil: (pointing to the lovely view) "That is Torquay, Madam." Mrs Richards: "It's not good enough!" Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..." Mrs Richards: "Don't be silly! I expect to be able to see the sea!" Basil: "You can see the sea, it's over there between the land and the sky." Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction." Basil: "Why?! Because Krakatoa's not erupting at the moment?
Nugget. You can use a small solar generator setup to power your Enet Router, etc., during power outages. This will allow you to continue to use the VOIP function and your Goggle Free phone.
We are not criminals looking for a way to hide. We are just normal people who are tired of being stalked. Mainly by big tech companies. My identity is not their business asset to make money with selling it.
no, Ooma phones do not receive or transmit text messages. However, there are other apps that can do this that Rob has reviewed previously. Rob now has his own very reasonably priced VOIP service with very limited texting designed to be used rarely for 2-Factor Authentication. (Find more about it on Brax.me - ask in the New Users Lobby)
The celular modem does not require a SIM card to comunicate with the network. It will still comunicate to the network its comunication capabilities (technologies and bands it supports) and other information. The cell phone will only be allowed to connec to the emergency services 911. If that particular cell phone has ever registered with the network it is still possible to search and locate the device throught its equivalent of MAC address. On the topic of location the tracking is done through the sensors and is independent of cellular technology It will use whatever band / technology is available to send the information back. Location services have been around for decades and is now easier to do by using the phones GPS sensor, WIFI and Bluetooth.
Always a massive wealth of important info. Our privacy is an inherent right & should be recognized as such
Rob thank you for showing us the latest threats to our privacy. You are a good man in a time where there's few left. I really appreciate your work 😎
Agreed!!
Where's your donation?
@@Mr.Robert1 Rob's social network is Brax.me where you can look in the STORE for a place to donate directly to Rob.
Brax. me only requires a password and username for signup. (Your email will never get nagged if you choose to provide it to Brax.me for account recovery purposes.)
How do you do secondary authorization on a lot of things with no phone number
A very lucid, articulate and elaborate presentation. Loved it.
Glad you liked it!
@mark traver thank you for sharing your thanks.
@Z1 So basically if you don't care about phone service, just using a mobile router with a simless phone will go a long way to making you private.
Every video is presented as such. He's great.
I've learned so much on this channel! Thank you.
Rob:
You are a brilliant guy who understands this technology and can explain it to us mortal humans. Thanks for your service to everyone valuing privacy! - Jim
So glad someone is taking the time and effort to educate the public about these issues and optional alternatives. Thanks
Very professional! Shows pros and cons for each device! Few people are that professional! Well done!
When the numbers are low you know the video will be filled with lots of great information. It's funny how some of the most informative videos are the ones that nobody watched.
I cannot predict what video will get high numbers. The algorithm decides that. To be honest it's not obvious to me what it is doing.
Or the ones that TH-cam says weren’t watched much.
TH-cam definitely alters views and likes/dislikes. Watch anything involving a certain political figure selected for removal, and you will see this.
Slow down q.
People are lazy and don’t watch for learning unless it’s something easy they don’t really want to figure out themselves
Thanks!
Robb, thanks again. I wish I understood more of your instructions, but I'm from dayton.
Wow this is just what I was trying to figure out it seems you covered my question for the most part years ago lol. Thanks for all that you do and please keep up the great work.
Wow. I just learned so much today. This was a very well thought out video. I appreciate your work you put into this. Thank you.
While no sim card will eliminate many ordinary cell interactions, I am pretty sure I doesn't preclude the baseband modem from communicating with cell towers or impersonators. For some time now I am living without carrying a device around.
Only a baseband with a SIM will have "interactions". So in this example, I isolated it to a dedicated Netgear which has no other function. This is explained in the last video on Backdoors
Nothing will ever be 100% secure ...
@@cmendoza1094 paranoia.
@@robbraxmantech I use my phones without simcard (exept 1 for communication only ) the others are regularly on the internet via wlan ..used for gaming and my android channel ..
If I talk about something privat I put the phones out of Listening reach ..cameras are glues shut .
I don't have any smart devices ..
I use a computer and some consoles but those are 90% of time unplugged and if on only used for gaming and yt too ...
I have never use online banking and don't buy stuff over the web ..
Those informations are well known which means its no problem to write here ..
What do you think ? Is that a at least considerable safe way to use big tech? Or am I totally wrong ?
@@AndroidFerret
I think the most practical approach is to both understand the threats and set goals according to them. There are things that are worth keeping out of "big tech" hands, and there are things big tech thinks are worth having but it is just collecting because it is a digital hoarder.
The system knows you exist. The various companies build profiles on everyone and they try to fill in data as they can. It is technically possible, for example, to use the FPGA on cell phones for speech to text and to be continually building an index of spoken terms and to trigger recording when a person's name comes up, then upload that to the dossier for processing.
There are all manner of ways of indirectly collecting information on people. That type of system could, at least in theory, be entirely automated by algos intended to fill dossiers using the means available. Most people don't understand the power in their phone.
It's exceptionally difficult to be completely outside the view of tech and it is best in my estimate to conserve that effort for things you want to be outside big tech.
For example, I bought a refrigerator one year and they ended up selling a model they no longer had, somehow, and refunded me the difference between it and the model I selected in cash (because of how the debit I paid in works). That cash conversion is completely outside banking records. It's an ATM withdrawl without an ATM record.
Cash-back can work in a similar manner, as far as bank records go.
That is cash the system doesn't know you have available. The same can be said for any personally sold items.
This cash can then go toward activities you'd prefer the system not have a record of.
Unless I have something specific to secure or need to be unfindable for a period of time, I tend to have a rather modest effort on avoiding tracking.
... there again, I have direct family with Yankee White clearances and others who have TS clearances who built a numer of ELINT systems (and some others). I have owls in my trees and sometimes I enjoy playing gross-out with them.
I would be very interested in seeing a video that discusses solutions and various possible set-ups for people choosing to use old, no-internet, flip phone. So only having a computer at home and using it as the only internet connection, in today's world. I'm in France and many people are choosing to not have a smartphone at all.
The companies should be supplying the devices if they want the mass surveillance system operational and have control of everyone's personal lives which social media accounts determine credit outcomes without needing to explain. I have spend thousands on devices which have been controlled by a person I have discovered over the years ,narcissism used to be addressing these people as control frieks which accepts the unacceptable unaccountable Narcissistic Personality Disorder. Im the targeted Australian who is ignored as I have been getting angry at my server because I keep getting investigations opened which close days later without contacting me. This is because my stalkers have authentication malware and Telstra investigations are controlled by him. An example of the system failure. If I threatened anyone, the police would actt instantly. Instead of waiting for someone to do something stupid due to this constant server timed out on phone. Dynamic Host Configuration services is every single devices configuration, he literally won't allow me to type. Sorry about the book, it been your channel that's helping most with your quiz, helping. I just want to control my device without having him fighting my devices as he hasn't hacked me, he's using malware and he new me for years but not well obviously, he was always overly friendly which I now know was just FAF. FAKE
I don't know how you can remember all this stuff and have it at your fingertips - I never could. I guess you must be an olympic standard tech guy. Thanks Man
everyone who makes high content videos has it planned out what they're going to say, probably written in notes they can use like a tele-prompter. But yes, Rob KNOWS all this stuff!
Have been using a lower end android phones without SIMs to store , 2FA apps and net banking stuff, etc. Something one can leave at home, find easily and use just when one needed and keep a bare minimum apps installed.... Less risk than keeping credentials on your "normal use" phone an less inconvenience if the normal use phone is lost.
"Too big for pocket use". HA! Let me introduce you to cargo pants, my friend! 😁
Ikr! I was like " why does he wear skinny jeans!
lol
Or you could do what I do & Extend the size of my pockets.
I essentially just cut the seams on inside of my pockets &resew it W/ a Zipper.
&Outside of the Default Pocket I make a larger enclosed pocket area, I can access if I need more room.
(&Not if I don't wanna have 2reach down 2my knees too retrieve my phone or whateverrr)
I also wear Cargo Pants tho actually.. I just modify them like thatt ha
Here ! Here !
Girls don't wear cargo pants.
Much of this video was involved with how to use a phone with privacy, which I'm not interested in. Haven't used a phone in years. But lots of good info. Thanks.
1:00 Netgear M1
2:36 different threats
3:25 Degoogled phone - list of attack
10:32 you can’t hide with this device
11:02 beam forming
11:51 police
I rarely use my phone as an actual telephone. Usually only to call my wife about mundane stuff. I've got a Pinephone and really like it, minus a few issues. I dock it to a monitor and keyboard and use it at my workplace as a "stealth" personal computer (they would look at me funny if I lugged in my own personal laptop... but never notice a phone). The only problem I have with that is my Pinephone looses its data connectivity in that mode for some reason. (I don't connect it to the corporate WiFi -- that's the point using it). So I have to tether it to the Android phone I still carry. Hopefully soon I'll have a solution and I can switch the SIM back to the Pinephone. I actually watched this video and I'm commenting now using the Pinephone! (EDIT: Great video as usual, Rob!)
One thing you will notice is that you can call your wife using Signal and you won't even realize you're using signal.
Wouldnt it be funny if there was a coordinated phone swap program where everyone in a city or state just swapped phones and kept pay the bills then the carriers wouldn't have a clue who had what phone lol. That would confuse the hell out of big tech, do the swap once a month and keep doing it until all their collected data is useless
great idea!! But someone would stop paying their bill on the phone you have when they lost or damaged the phone they happen to have. That might work better in a small town where everyone knows everyone else.
Excellent, not funny. It is going to take this kind of creative thinking to break the almost total control they now have of what are supposed to be OUR PERSONAL COMPUTERS!
@@mistyculous9644 , Or any network of people who can trust each other!
The biggest problem with this idea is that you'd have no idea what number to call to reach someone.
If you have several family members on the same plan, you could do this within your family. If you had say four phones of the same type, you could put a different colored case on each one, then send out a group text each day identifying which phone went with which person (using a private code to identify each person). The text could be something like "alpha-blue, bravo-orange, charlie-black, delta-green" and by that, you would know who was using each phone.
To further obscure the data, anytime you send a text message, send it to the group rather than an individual so that "they" don't know the intended recipient. Another idea is to add an extra phone or two to the plan, so not every phone is used by someone every day.
@@FarmRanchHomestead
If you have 6Family members on a Plan regardless if you switch phone or not the company will still have the names and information of those on the Plan.
Thank you Rob, excellent presentation. But even when you're sim & battery removed,that still can be tracked.
only via IP . not if you have dynamic IP that changes
Excellent video! easy to follow, everything explained and understandable, with in depth review of pro's & con's. Much respect to you my friend! I appreciate all the content you publish. time to get myself one of your de-googled phones!
One of your best and most useful videos.
New subscriber, find your lectures very interesting and understandable and I appreciate you targeting the non-IT person.
Suggestion: when you consider VOIP devices there are those of us who want to connect it to a homes conventional telephone wiring and use conventional landline touchtone phones. Look for devices that supply dialtone and generate ringing current
(90v 20Hz).
Thank you for watching! When plug a standard phone into Telco wiring then that is straight voice into PSTN. It is not digital. So that is not VOIP. Only your telco can deal with that. VOIP is specifically about using the Internet.
@@robbraxmantech My current cable modem has a telephone wire that plugs into the wall. As a result any phone in my house connected via a standard telephone wire on the wall in each bedroom has the phone services channeled through the cable modem. I plug in standard phone into the wall; they have dial tone; but going over the cable modem. Isn't this setup called also called VOIP?
@@akayla5435 phone that connects with cable modem are digital and hence can do VOIP calls
regular landline that do not connect to internet do not offer VOIP
A pillar of freedom! thank you
Thank you TH-cam. GREAT channel! THANKS ROB!
Brilliant video Rob, absolutely brilliant!!
SIM has to be the biggest backdoor that you have zero control over. I've been saying this since I first started watching your channel. SIMs are more often than not have your real world identity tied to them.
Just wait... TPM. It's the new SIM.... for your computer
When I was young, I got an unlocked phone with the idea of getting service later. I never bothered - and with all the tracking, battery drain and problems it causes, now I'm proud to use airplane mode full-time.
so, why do you need that phone at all?
EDIT: I mean, what’s the point of buying a phone if you are never going to use it as a phone?
@@_sneer_ maybe as media device to play music and a camera. That's about it.
Calculator, Sound Meter, Torch, Clinometer, Camera, Music, Videos, and Wifi internet.
@@Ultrawide_Gameplays he could play music on a fiddle instead and paint pictures with a brush
i am always on airplane mode but when i dialed 911 i got connected despite my sim card was removed. i had to remove some apk app from my phone using adb command
@Rob Braxman Tech @ about 3:20 + you mention that the IMEI is not trackable but the IMEI is stored in and specific to each phone. Please clarify.
Have had Ooma for years. Use it for most of my calls. $6.00-month.
Love that you are always thinking about this stuff. Thanks
i used a magic jack when i lived in the Philippines so i would have a USA phone number. before i moved to Philippines i used a Vonage to talk to my Fiancee NO internet. previously used Skype but i thought that SUCKED!
i really enjoyed this video!
Thanks so much Rob for the super interesting & informative video. It was really a worthwhile watch.
Is it possible to use this same setup using a Verizon CDMA portable Hotspot and VPN Router with VOIP phone setup?
Have been doing this (no simm in smartphone) since lockdown and discovering your channel/the depths of the data breaches. Still have sim in Nokia 8210 needed for business, don't miss the smartphone at all on road.
Having a SIM on a non-Smart phone is a great solution. If only we can easily find them for 4G
@@robbraxmantech very true mine is only 2g which is still fully available here in the UK. I was using the Nokia 106 still 2g before but the 8210 is last phone here before cell to cell tracking technology appeared.
8210 still work today? I mean still receive calls? If so with which carrier?
@@robbraxmantechwe have phones like nokia 215 4g and 105 4g, it has volte support
I use visible wireless as my internet. I tether my phone via usb to my ubuntu PC. I have an old wifi router that I connected my magic jack and wall phone to it. I have the magic jack app on my phone for when I am mobile. I really enjoyed your video. I just can't use a data only modem with visible wireless but it would make my setup even better than it is.
Complex, but WELL DONE! Many options, and thanks much for sharing! CHeers! :)
Really nice video. I didn't think about the portable router and degoogled phone running a VPN combo. That looks like a viable daily driver especially if you carry a backpack or tactical bag.
Paired with a small "solar generator" this could be a portable solution that works wherever a usable cell signal is available. A briefcase, bag, or backpack would be needed to carry it all, but all these devices could be built onto a board or backplane that would keep them tidy.
They still know where you are based on what tower the LTE connects to, and where your packets are being routed from, and if they know either endpoint of a communication, traffic analysis tells them the other endpoint, even if it's encrypted. You can bet there is traffic analysis happening around TOR nodes, etc.
The only way to obscure communications is an independent network which cannot be monitored, or an encrypted cloud which is constantly sending noise packets to all nodes so communication appears the same as no communication to traffic analysis.
Gods work good sir, and with good timing. THe only boomer on the internet who is tech savvy!!!
hey rob, u cant use voip with a vpn turned on, and u can use sms texting on the wireless router, u just need a pc or simless phone to access it.
Ron: I have an old Tracfone flip phone and only turn it on when I'm using it, so most of the time it's turned off and put away. I do not own any kind of "smart phone" basically because I hate talking on the phone. How secure privacy-wise is it?
The CST call audio, SMS text, and E.164 ("telephone") and IMEI numbers, and call duration, and distance to cell towers, are probably being recorded for both/all parties involved in any uses of the device. (And the phone might still ping cell towers sometimes, when powered off, as long as the battery is inserted - but you'd have to test that with radio-frequency sensor.)
And all of that is easily correlated with the banking identity of the customer, if you're not paying cash for your airtime-refill cards.
But is any of that likely to adversely affect your life in any measurable way? Not really. :-)
It's just our civic duty to feed the beast with data as little as practicable, as it were.
For the average person, it's a great choice
Lol privacy on a smartphone? Just LOL
My TracFone regularly was loaded with a free spyware app i kept deleting
please review ghost phone e sim from MacAfee. your credibility and testing would be huge for the consumer
Jovan Pulitzer explained the panopticon with phone apps and how you're being monitored through back doors installed on apps in your phone that can't be deleted. no matter what you try to do. You try turning off notifications
That's why you have to have a de-Googled phone. Not a regular phone
@@robbraxmantech im hoping to get one once my contract is up!!
@@robbraxmantech if you go to javon pulitzer's yt his video on a look behind the curtain. You get incredible insight on how apps are all connected. Jovan Pulitzer is the owner of cyber ninjas who currently just did the audit in Arizona. I think he invented barcodes or something.
@-WhiteFang- Look at the phones supported by the operating systems. Garbage in performance AND security. Why not a BlackBerry? I wonder.
@9:55 How can you use a messaging app with this since it requires an SMS verification code upon subscription? The missing link would be a wireless router that has SMS capability.
Great video rob, once again great content...
My dear friend your explanation was perfect. Only I could not catch up with all the gadgets. Electronics give me a headache. I'm still having problems to fully utilize my mobile phone. It is beyond me how can you use phone without sim card? Regards from EU. Joseph.
phone without a SIM card is simply the same as a tablet... as mentioned if you need calling or texting, you need other apps for that, instead of the phone app designed to make calls and sent text via the SIM card (connecting to cell towers).
You hae become one of main go-to guys when looking for anonmous/privacy tech info, me.
Thank you so much 😎
Greetings from Stockholm Sweden Europe
Greetings! Skol!
I used to have a Verizon phone that did not have a sim card inside. I don't see why cellphone carriers have to bother with sim cards and the problems they cause when they already have the device I.D. of their customers with the phone number and account details stored on their database in order for the customer to use their sevices. If the phone was lost or stolen then it only needs to be deactivated by contacting the cellophone call provider on the internet. Hopefully future phone development will no longer require sim cards.
My carrier allows limited hotspot sharing, then throttles it back. I've been using my tablet as a hotspot until it runs out, then switching to my phone.
The limit on data usage directly from my phone or tablet is much higher.
So if I use the Netgear, does the cell phone company think it is hotspot sharing with the lower limit, or will it just be seen as if it were the tablet or cell phone data?
the best two techniques I have are: 1) use a sandbox/burner phone for home-only apps, and do not take it anywhere else unless off/battery removed, and in a Faraday bag. You may be able to get away with no SIM. 2) Turn off/remove battery on your everyday phone and carry it around in a Faraday bag unless you specifically want to be 'on the air' and contactable, or to make a call, etc. This should stop 90+ % of useless Trace-And-Trace CV19 threats. You may be able to get away with a dumb phone if you can restrict it to phone calls and texts.
That's an insane amount of spy work just so Google can't steal your personal information. Which demonstrates how bad things are. If you want privacy, you're assumed to be up to something. People don't understand how bad that is.
Good day sir, I just want to say thank you for all your efforts to inform us about the security challenges we face in the tech world these days. I have been interested in a "de-goggled" (intentional spelling, I seriously dislike google goggles) phone after watching your videos. My only question is if you know if anyone is working on a de-goggled handheld device that is equipped with a high-end camera and stylus? Really that's all I need. Thanks again for all you do. Shalom.
Please join the "Linux Chat" after joining Rob's social network and support site: Brax.me Or, you can ask your question again in the "New Users Lobby" once you get into Brax.me.
Thanks for sharing. COMMUNICATION IS TO LEARNING AS OXYGEN IS TO FIRE. REMEMBERING PROVERBS 4.
I survived for decades without any smartphone and didn't die. Must still be possible to do so. Rob is really good with getting around the big tech spy networks. It's just gonna get harder to be connected to the Internet and use a cell phone without big brother knowing your every move.
I never needed a phone either, until once my car broke down in the late evening. I had a heck of a time finding a place to make a call to the repair shop.
Amazing! I had no idea!
Our company in VietNam uses TP-Link to duplicate your proposal. Every one of our vehicles have these. I (a Boss type) have one on my (trousers) belt.
Additionally, we also mount very low power GPS jammer up against each TP-Link modem so should there be any GPS receiver detect GPS - all our setups have the same false GPS locations!
Remember to set up Media Access Control (MAC) addresses to control pirate users.
Lastly, your WiFi equipped cell will NEVER become dated when carriers cut off 4/3G signals. :))
I am using a Google voip, Google voice, with a handset like the old days. It runs off of my wifi connection which I get from land to land receiver. This is because I live in a wifi reception hole that works just ok with a cell phone. Would the Google voice work as well as the omma? Not too tech savy so I don't think I get all the points you are making Rob.
I know this is an older video, but my experience with no sim card or cell provider access. Yes, they can still access the phone.
I had moved to another provider and had installed the new sim card and had not unlocked the phone (which I outright purchased, but they still had it locked from that purchase point, why is that could be another question asked)
I removed the sim card and was able to call the previous provider and get them to unlock the phone without having any sim card in it. All they needed was to verify the phones id. (I forget which one, but it was in the system settings [iPhone])
So if your not in airplane mode, it transmitting and receiving even with no sim card installed.
You are observant and correct, according to Rob in other videos about iphones. Perhaps, unknown to you, the phone you purchased had an e-SIM already installed that cannot be removed?
Rob recommends using only degoogled Android phones and not iphones. iphones have a mesh network that connect even when there is no SIM in them and the iphone is powered OFF...ihphones cannot be "de-appled."
Can't you still make 911 calls without the SIM?
If so you're modems are still connected and activated
Not sure if this would help, but as someone else mentioned, there is airplane mode.
@@al-du6lb yes I know but airplane mode isn't going to stop the government from spying on you ... If you cannot physically disconnect the modem it can still be used to spy on you if it has a connection even though it's TS in airplane mode.
@@ashishpatel350 yeah, you're prob right
Airplane mode can apparently be circumvented such that it appears to be on but doesn't work. It has been on my phone
yes any phone without a sim still calls 000 here in Oz so i would assume its the same in most countrys
Thanks Brax 😎🥂
Can anyone advise? I just bought a de-googled phone suggested by Rob. My question is this: if I move the old sim card from my old android into the new phone, I presume that will mean my new phone is now tagged with all of the data processing collected by Google on my old phone? There are new google apps on the new phone. Only the old sim card. This may sound like a silly question but I am not in any way a device nerd. Is my phone privacy now compromised?
no, but you can reveal these connections by not using what Rob called: Browser Isolation. Meaning, giving each browser the means to cross-reference and index what the other providers are doing. (Don't use a gmail address on Amazon.com for instance.)
I'm interested in the Librem 5, bittium or metaZERO... just like lots of other folks, trying to get away from Apple/Google, perhaps de-Google phone is an option, but I'm very keen on the new blockchain phones coming out. I'm only just learning, any suggestions?? Thanks!!
Rob (or anyone else) do you know anything about the blockchain phones? Decentralized? Is this not the way forward? Would love some thoughts ...
I resub every time I see you in my feed 😂
I didnt have read someone saying anything about how to protect from pegasus on android. I will try no-SIM. Thank you
You can also use a VoIP using an ATA so tou can call your home phone, enter a PIN, you get a land line tone then make calls out anywhere you like.
Great Information. Thank You for taking the time to make this video.
Rob, what about just using a Blackberry. Sure with a SIM that security is lost but as to hacking and commercial tracking, isn't it pretty secure as the apps are limited and there is not Google Services running?
Hi Rob, VPN came up in a conversation today with another ham (was your ears burning). Will the BraxRouter be fast enough for me to remote work with? I am a full time remote .Net developer and do a lot file transfers and bring up a VDI machine (onsite VM). Looking at using the router on my boat and camper when traveling. PS: I might be connecting to a remove Flex-6400 for Ham radio too.
VPN speed is completely dependent on how far you are from the server. I don't notice any operational effect on my activities.
Thank You so much! You are super intelligent Person/Educator!
The 📱 CellPhone Affairs Are Being Purposely Used By The Departments That Are NOT GOING TO BE ON THE SERVICES 📲
Your solutions always work,,thx
Just commenting before watching video
Mr.H ® approved! 💪 Now you're speaking my language Roberto ❤️ 325k Subs???🤯 Whoa!
Riiiight.... 5G pin points your location, LTE just gives an approximate location.. This is probably the main reason why AT&T is pushing over to 5G..
5G network is pushed globally...unfortunately.
This is SCHWAY as hell. Hack your privacy back! Good good stuff and you know what you're talking about. Thank you for making stuff like this.
great video Rob! Thanks
I am having best results with my own hardware and custom software security phones, which however are a costly solution. I started also to mechanically modify phones, in order to make them deaf, dumb and blind ... without headsets. Which isn't cheap either, and not so secure.
Thank you, people/ brains like yours should be available commercially to people like me low tech ability and set up our private cyber desires
Come to Brax.me and get the low down from the rest of us who are congregated there to help the newbies.
how a sim card with phone number and data only would help? no registration or personal details given when buying.
Prepaid plans (vs postpaid) allow to use whatever info you want... enter all fake info and it does not matter. Other benefit is they do not require a contract.
Just note, you might have to port forward for your ooma for stable calling connection. At least I did back in the day. Wasn't hard but should be mentioned for some.
I do not ever do port forwarding.
Hey Rob, I want to buy one of your de-googled phones but I'm afraid I don't know enough to use it effectively without downloading the wrong thing and ruining all that investment... am I over thinking it or do you really need to have a minimum knowledge of the way cell phones are programed? Do you have technical support after purchase?
There's only one rule. Do not put anything from Facebook. Otherwise, if the app works, it is fine. Nothing from Google will run. But 90% of apps will work. The secret is the lack of identity. Just watch the De-Googled video
@@robbraxmantech oh, I have... that is the video that woke me up. Sign me up bro. See you in your store.
@@1N2themystic go to Brax.me and check out the phones is the STORE area of Brax.
What about wifi tracking maps like wigle? Anytime you use wifi it is mapped and can show your exact location and device.
12:15 - Even I had to look this up so I'll post it for the benefit of less-technical users: _The PSTN is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators._ Which had confused me because I expected to hear CSTN, but I see PSTN is rather like saying "the Internet" and CST is more like saying TCP/IP.
awesome video, I have subscribed to your channel
When you say SIM card, does the exact same apply to eSIM? Can you specify advantages and disadvantaged of eSIMs, especially since you can get an eSIM data only service anonymously. What about the difference between an eSIM service that is data only VS an eSIM service that also offers a phone number and SMS service?
It'd apply to eSIM too, the only difference is that the sim info is saved directly to a portion of the phone instead of being on a sim card.
Rob has since made videos and a live stream about eSim issues; in March 2024
Mrs Richards: " I paid for a room with a view!"
Basil: (pointing to the lovely view) "That is Torquay, Madam."
Mrs Richards: "It's not good enough!"
Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..."
Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
Basil: "You can see the sea, it's over there between the land and the sky."
Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
Basil: "Why?! Because Krakatoa's not erupting at the moment?
good video. How this no sim strategy will work out with the new built in sim card phones
Nugget. You can use a small solar generator setup to power your Enet Router, etc., during power outages. This will allow you to continue to use the VOIP function and your Goggle Free phone.
Could you not use the burner app to supply a regular number for texting and calling cellphones over your wifi connection?
We are not criminals looking for a way to hide.
We are just normal people who are tired of being stalked. Mainly by big tech companies. My identity is not their business asset to make money with selling it.
Its what I use. The M1 router, OTR mobile and an old android phone. Its my go to on the road setup.
It's always gratifying when someone else reinforces the advantages of what you've invented/put together on your own, isn't it?
Oh yes. Oh yes. Beautifully done!
if you use ooma with the app, could someone send an sms to your smartphone that way? This video was fascinating, as are most of yours. Great stuff!
no, Ooma phones do not receive or transmit text messages. However, there are other apps that can do this that Rob has reviewed previously. Rob now has his own very reasonably priced VOIP service with very limited texting designed to be used rarely for 2-Factor Authentication. (Find more about it on Brax.me - ask in the New Users Lobby)
I'm not trying to hide. I just value privacy. Because you can't have liberty without it.
The celular modem does not require a SIM card to comunicate with the network. It will still comunicate to the network its comunication capabilities (technologies and bands it supports) and other information. The cell phone will only be allowed to connec to the emergency services 911. If that particular cell phone has ever registered with the network it is still possible to search and locate the device throught its equivalent of MAC address. On the topic of location the tracking is done through the sensors and is independent of cellular technology It will use whatever band / technology is available to send the information back. Location services have been around for decades and is now easier to do by using the phones GPS sensor, WIFI and Bluetooth.
Very relaxing to watch and hear.