Better question, why is harvesting your data NOT illegal? The EU bans violating your personal data privacy and has heavy fines for corporations that do it anyway. Why don't we? There have been attempts to make laws to protect our data privacy, but they were not allowed to even hit the floor in congresss. Why? Are our congressmen being blackmailed or bribed by the big corporations?
I was talking to my brother across the country just last night about a book I just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. Akerace Drill
try saying i fancy a caribbean cruise several times, i wish we could go on a cruise next year or shall we book a cruise. I tries it and not to my amazement I was suddenly flooded with cruise adds. I never typed anything in just said it allowed.
My best friend was merely talking about names for an animal in the household (not on the phone, no other listening devices) and that name came up the first time they used the phone after that.
@@stewartpalmer2456 last night I said “seriously” to my boyfriend 10’ away from my phone. Siri said “ Uh huh?” So unconsciously I started whispering LOL
@@stewartpalmer2456 we did some experiments on the UK and Serbia - mentioning obscure products in front of a couple of open laptops with FB running and sure enough ads popped up next days, and even emails. I discovered subliminal messages on TH-cam videos (almost certainly illegal), pre- programing people to support the Ukraine in the present conflict - and got friends across Europe to freeze-frame 'infected' videos to look for it - the results were different from country to country as to whether it was there or not and some other parameters (I don't recall them all precisely now). I also found a subliminal message telling people to vote for the Labour Party, years ago, in one of their seemingly innocent political brpadcasts - again it was almost certainly illegal. Whether it's a criminal offence or not I don't know, but having wasted my time reporting clear political fraud in the UK before, with police and electoral officers just not giving a toss, I just didn't bother to report it, sickening though it was.
@@78tag Yeah, that happened to me having a private conversation in my home with a friend. He was due to receive a lump sum of money and jokingly said he would buy a pre-paid funeral plan with it. Later on when I went on my phone, the ads I was getting were for companies that sell pre-paid funerals.
He's that 1 big brother that in public defends his lil brothers from other bullies but behind closed doors, beats up his lil brothers that are too scared to tell the neighbors.
My stepfather had a Jitterbug flip phone. He switched carriers and they wouldn't use it, so it was shoved in a box for several years without being able to connect to a cell network. I found it because I kept hearing this weird noise - which turned out to be the LOW BATTERY sound. It still had several percent battery life after YEARS.
All the time it was in the box the microphone could pick up sounds, voices go easily through a card board box, all the time the microphone has been busy with collecting data, how many people there are in the house and at what time they are up or asleep. So now and then it connects to a network to send in a report. Then it switches itself off again, waiting to send a report next month.
@@larryboyd1872 Not all microphones need a battery to operate. Once I won a cheap watch on a county fair, in less than a year the battery was empty and the display stopped. A new battery would cost me ten times as mutch as the value of the complete watch. I stored the watch in a drawer somewhere. But many many years later, every time on a certain date the alarm would go off and it beeped. Sometimes an old battery is not completely dead.
Already being worked on which is why it stays at home and I use an mp3 player and a digital watch for out door adventuring since I do most stuff on social media or on my email these companies are gonna learn the hard way.
I am experimenting with two solutions. The first is a dumb phone. It is a clone of an old Nokia (real Nokias are also available), and I don't even have a data plan for it. I pay less than $10/month for unlimited text and voice. However, nothing will keep your location from being tracked by the carrier, as they can triangulate your location off the towers. And the truth is that your SIM has its own processing power so who knows what it may be collecting and sharing. The second thing i am experimenting with is a FairPhone. It runs a de-googled version of Android and it has a lot of powerful privacy features. I really like it, but in the US it will only work on T-Mobile or one of their MVNOs. I am paying less than $30/month for unlimited voice, text, and data. However, another bonus is that it is user repairable with nothing more than a small screwdriver. In the U.S. it is sold by Murena, everywhere else it is sold by Fairphone or Murena.
@jimcabezola3051 Just curious . . . What device did you watch this video on? I've never carried my phone around very much. The main reasons are it's a pain in the rear (don't lose it, drop it, or accidentally leave it somewhere. I also don't want all the interruptions of my time by notifications, calls, & texts which can become 'like a ball & chain.' The other reason is we KNOW that EMF is NOT harmless whether it's ionizing or non-ionizing. If my phone is in my purse and I'm driving somewhere, it's only in case I MIGHT need it or want it. If there's a long line at the bank or grocery store, I'm glad to have it to pass the time more quickly. More often, I forget it's there. At home, I spend most of my time outside. I don't take my phone with me to mow the lawn or clean the pool, etc. It can remain off for several days at a time, usually until I figure I should probably check for msgs. Meanwhile, I have 3 tablets that are NOT synced to my phone & those are the devices I use the watch YT, Google something, play music or games, email, etc. Sure, "they' can capture my on-line activity, what times I'm on or not on, but my location is gonna be pretty boring. My tablets rarely go anywhere, and when my phone is with me, it's usually off. Curious to hear your logic, etc.
Always be on high alert when something was purposely misnamed from it's actual purpose. Especially when the "name" seems more trusting than the actual purpose. For example, "app measurement" seems like like a neutral app to help your phone measure app data. But it's actual function is to track your private data. The same goes for politicians. When the majority of them vote for a bill that is named something that is trusting, make sure it does exactly that and not the opposite or else. Always remember that you are in control and everyone else benefits when they take that control away from you.
If it is a government bill, look for the words "child safety" cause that is the pill that they encapsulate the destruction of our privacy with. Child safety, always for child safety. You want child safety, right? We all want child safety even I want child safety. But not at the expense of encryption or privacy.
I have a tracker detector and blocker running in my phone. Google is in Everything! To be an Android app producer, you must allow this. Facebook allows sometimes a dozen trackers at one time. They dont even directly handle the data they scape. Your phone is 24/7 surveilance.
I use a degoogled phone [uses android open source project instead, which has no android apps in it] and don't have any apps on it that can compromise me to corporations unknown. No tiktok, amazon, etc. I've been trying to convince people about the dangers of their phones and I've never had one who appeared to be interested in remedying the problem. people think about Security and assume that Privacy is the same thing. Many 'experts' on line don't seem to know the difference either.
@@robertsandy3794 Pihole and similar DNS solutions are not really suited to monitor such kinds of traffic. There are connections from hard-coded IPs (hard coded in the OS itself) that don't even show up, because there are no DNS requests. To fully grasp the situation, you would need to monitor the traffic with something like Wireshark.
Normal people wont trade convenience for "security-holes", unless they have been in those "holes" themselves. People compromise easily when they dont see the immediate risks, let alone if they dont understand its working and effects. Education down to the basic is the only way, but not everyone will be willing to learn. We win some, we lose some. Saves what you can, but know when to let go.
It gets much worse. My old flip phone used to use 0 battery power even if turned off for several days, but new smartphones seem to use about three percent of battery power overnight whether they're turned on or off. It seems that turning off only stops It from responding to user input. I suspect it is listening, tracking and reporting on what I do even when it is turned off.
@@johnmoran1481 that's not a real test. The phone is going to spend a lot more energy restarting than sitting idle in the same time. It's not unusual that if you record the starting battery %, shut down, start, and record the % again when it's ready, the % will have decreased.
@@weevilsnitzyes but leave your phone off for a couple days and you’ll lose more that just that bit of start up juice. So it’s doing something. I went hunting with zero cell coverage so turned my phone off at 95%. When I turned it back on 5 days later it was under 80%. It’s an iPhone 15, that tells me it wasn’t really “off”.
Nobody turns their phone off. When you press the button on the side and the screen goes dark, you’re only putting it to sleep. If you actually turned it off, then it will stop using power.
It's sad that we have gotten to a place that this is acceptable and few seem to care and little is being done about it. Also on your next test see if after you "uninstall ???" the app such as TikTok does it still keep stealing your data.
Bursts: most apps can't remain active due to recent Google services limitations. Thus, they use Google services to activate their service and thus have to do their job when Google allows them. As far as I recall, they have 90 seconds before getting disabled again.
Hey Liron, what an interesting video! Watched till the end :) I would really like to see you make the same video but with an iPhone just out of curiosity :D. But this video and many of your videos in general have opened my eyes!
I can tell you they do pretty much the same thing. I noticed all the domains my phone reached out to and blocked them on my home network. I don't do social media but for some reason my phone calls out to Meta, TikTok, and Snapchat. I don't have anything to do with any of them.
Really enjoyed that video. As you alluded to that not all websites are showing the tracking behaviour because they are employing other methods to extract that precious data from your device.
Great video! Don't forget that DNS is very often used to send data "home" as opposed to looking up an IPv4/IPv6 address. Although originally just a technique for "bad actors" to exfiltrate data, it's now used by "legitimate" companies too. It would be interesting to see if any of the lookups contained long hex strings in the queries that were bursting.
Depends upon which version of iPhone, and even the iPhone size and other items. Note that when they came out with items such as the iPhone 16 pro max, that they also essentially discontinued most of the iPhone 15 line? iPhone 16 includes items which *they claim* make it more secure in case of loss or theft. Some of these items are not ever available to be bypassed or turned off. For most any iPhone, also consider it is always being tracked by the carrier, always sending out IMSI, always looking for WiFi and Bluetooth, especially low power Bluetooth.
An absolute eye opener for sure. If our devices are Dopamine farms, does that make developers the Dopamine farmers? Lol Appreciate the video, gained some good insight here as always.
I think that you already had a question about IPhones and if they have the same issue. Looking forward to your next video on if this applies to IPhones and how to stop this activity. Love the videos.😊
@@dwaynenewton1 what's the phone doing when off you ask? It's doing the same as a guy wearing hat and sunglasses while pretending to sleep in same room as you, listening and watching your every move. Can you say :"hello big brother" ?
Technically speaking they are off. The OS is not running. If you leave it off for 2 months your power level will be near the same. That said the sim uses a very low quiccent (micro) current level But some secure facilities require you to deposit your phone into a copper mesh faraday cage in case it was compromised or you are an agent. RFID tags are powered externally through EMF
Tracker Control and Warden are 2 apps that can check for spyware, well, most apps have them. But try those apps out, can help you block ads as well! It can give you a lot of information as well. - Darkijah
This is something I always wanted to try doing. Very interesting finds, this is one reason I largely dont download apps and just use my mobile browser when possible.
Sir, Very informative video. Government should restrict these companies to steal data of people without their permission but these companies are paying millions of dollars to government, therefore, no such restrictions. Ultimately people are paying the price.
@@nickplays2022 Definitely, but isn't it a blackmail that in leau of technology companies are compelling people to accept their terms and conditions. Secondly, if people have more options who will accept to compromise with their data. Yes, government has capabilities to restrain these companies but as mentioned the reason it is silent.
Excellent work! I wonder if the devices save the info and send it back while not connected to the Internet. Also what are all the mystery folders with no items inside doing on my device?
TBH, this is the reason I have gone back to an old flip-phone. I'm just done with all the tracking, all the listening, all the meta data acquisition. Seriously. I'm about to just get rid of my phone altogether.
@@cheery-hexI don't see how purchasing one of these would assist. They all still will make DNS requests. The real question would be once the phone is not at home, what facility will allow us to blacklist these DNS requests without rooting our phones
I realised, that in some case, especially belongs to Google, your phone is listening to the environment too and transfers it to Google. This was when I was near people who talked in ukrainian language - when I then searched for a place, Google maps were written in ukrainian language. Other time, when I was near people, who talked turkish, Google maps went turkish. By the way, PI-Hole seems to be used for MITM attacks...
It would be interesting what apps are blocked on this same phone after installing the Duck Duck Go web browser and turning on the background blocking tracking feature.
@@Skiddy1963 Eye opener about Duck Duck Go: In particular, it doesn't encrypt search terms in the URL bar. Also, your data can be monitored if you share it on third-party websites or through online forms.
Those apps might stop but the phone still has services that send data. Mine was sending tons of data to Chinese servers, because that's where it was made. This might depend on the manufacturer, of course.
stick a firewall in between your router and modem, and record at least the packet size, amount of data being sent. If you have the means, you can decrypt the SSL and see what is leaving.. but this tends to be expensive gear.
I think a more useful information would be to identify which apps are making those requests and not just which domain they are contacting. For example, if the amazon app tries connect to tiktok, you would blame tiktok although the request came from a different app. Knowing which app is making the request can let the user decide if the app is worth it. Just my thought. Nice video though. 👍
Great content, just subbed. What about a more deep dive into this? As you mentioned, can you track the ip addresses the phone connects to via our router and see where it goes, can we block them on a network level, can we create a system on our phones that'll block the device being connected to those (without root), etc etc
@@aliceg1212That's only a track record for how much TOTAL data was sent over internet. Also, iOS behaves differently and will have a very different domain list
Phones being by nature a social networking device I believe will always have the problem of unwanted analytics creeping in. I would never consider a phone a safe device for any kind of storage for important information. Edit: Malicious actors will always be seeking to abuse these loop holes.
Hi, thanks a lot for the very useful video! Could you please do the same with a Huawei phone which doesn't have google to see where it connects? Thanks a lot!
I basically run my phone like an old Nokia. No banks, like 2 added apps. No location, bluetooth, wifi connected, no auto updates, no auto nothing, yet if I don't plug it into the charger at night, I lose 50% of battery, starting at 100%. If it starts at less than 100% and I forget to plug it into the charger, it uses up all he battery as I sleep, then turns itself off. I have no idea what it's doing. Cheap Samsung, tmobile, Samsung internet.
Modern phones use more battery than nokias, altrough dunno if it should eat up more than my laptop but then again, a laptop uses more processing power to run stuff than a phone. Don't mind it too much.
Interesting, but somewhat flawed experiment. 1. A DNS lookup means a connection is being made, but it does not mean any data will be sent. In fact, certain applications create all their connections when starting up. Practically, you don't know what data is being collected and tracked. 2. Of course there will be multiple connections to Amazon subdomains, for different services and APIs. It can all happen at once because the application just creates connections at startup. 3. When you are not logged in, it still is very likely that connections are being made on startup anyway and is not necessarily a sign of tracking. I am sure there might be tracking, but not to the extent you are alleging. 4. Not all API calls are for tracking. 5. For Firebase, some "tracking" is to know what parts of the app you are using, e.g. if you used a certain feature or not and how frequently. This info, in anonymized aggregate, is useful to app builders to improve their apps.
Hey Liron. Wow, that is hectic! I did see your VPN video about a month ago. What I do is keep Proton-free VPN on. On a reboot of the phone make sure is on I almost set it and forgot it. I do understand not everyone will, but it is a good habit to get into. Take care.
I didn't fully scroll through all of the comments to see if this had been asked yet, but it seems pretty worthwhile to get an answer. What lists did you configure pie hole with and how can we get them?
This is insane! I'd like to see how one of those "de-googled" phones performs in this test. Meanwhile the few politicians that might care should be notified that this invasion of privacy must be stopped.
Well, as someone who was born with the paranoid gene fully enabled, this doesn't really surprise me. I do share your bewilderment as to why so many in such a short amount of time. And this kind of activity is why when you travel, be sure to find out ahead of time what the roaming charges might be, as some countries have very high charges and one might think well I didn't use my phone for anything, so why do I have a $6,000 cell phone charge? If you do travel to such a country, keep your phone in airplane mode at ALL times unless you are using a wi-fi connection. Thank you for the info.
Companies expect you to collect data on yourself and send it to them on your own dime. How they are able to do this without expecting to pay me for my time, data, the traffic of sending that data to them, is sort of mind boggling. Thet set it up so they get 100% benefits with 0% cost. It's all on us. We provide them with our own data at our own expense.
The fascinating thing I found is that my cell phone, whose expired SIM card is from another continent and has not had service for years... still has full GPS capability. Meaning if I open up Google maps it will show me exactly where I am. And this feature even worked when I was lost in the mountains of Bulgaria.
@@turtlefrog369 ok, maybe I don't know much, but doesn't the tower have to SEND the location for my phone to know where it is? So the tower knows where the phone is 24/7... even though I have no service and the card isn't compatible with any local network.
@@rageonyxGPS satellites constantly broadcast signals. A GPS device then can calculate the distance to the satellite. So the device needs to receive GPS signals from at least three to four satellites, to be able to calculate its own position. At no point does the device communicate with the satellite. Think of it like a TV satellite, where you also only can receive signal.
@@rageonyx cell towers are not GPS. although i am sure cell towers can act ike like GPS satelites maybe. There are different location services being used in phones. GPS, cellular and wifi. GPS is the most secure because its recieve only.
Going to try and see what iPhone does and trying to get other non DNS data too (much harder without rooting a phone which I am not keen on doing but well see)
Privacy and data gathering are different things. You might still have everything you're doing being watched, but maybe Apple is a little more cautious about releasing your data to outside companies.
@@mediocreman2 Very true, however it would be interesting to see the practices which Apple are using versus Android - given lots of people trust the security of Apple vs Android.
I understand there is a lot of telemetry going on from you sim card that won't show up because the traffic doesn't use the phones OS. I only read about it and know nothing else about it.Thanks for the information sir
Also cheaper solution: If you're the only one in your PC who is upset with different staff, you may use "hosts" file or sinkhole it on router if some more ppl or devices would want to benefit.
@@Inisfad Sure you can. I don't have Amazon, Facebook, or much else for that matter on my phone. If I want to use any of those services, I use a web browser and login as required. If those services had something where I had to use an app, it is unlikely I would use the service, but I could use a spare phone that is normally turned off. That spare phone has LineageOS installed plus it does not have mobile data access.
If one is really concerned about surveillance, Then obtain an old phone with no GPS & a removable battery. Additionally obtain a portable faraday container to blind the phone from the wireless internet. 😎
Please go into further detail on the different type queries, such as A, AAAA, and HTTPS. What are they doing? And type look-ups, such as CNAME and IP. What's the difference? I too have been using Pi-hole for years. What's even scarier is watch the queries increase once you plug the phone in overnight. Once you begin blocking certain things, it irritates the device and software into frantically pinging those IP Addresses all night. It's like the device knows it's connected to the Internet, but can't achieve it's goal.
this video is great info for android phones. do you have one about iphones? do they do the same things? would be great to know since we cant get into the device to alter the ip address
The connection itself doesn't mean there's any actual data leaving your phone. You are listing DNS requests and not actual communication, so all of this is BS.
It ok if you didn't understand. The entire point wasn't the data, you need Wireshark to see that. The point was the simple questions: why do so many connections get made? Why are so many of them to ad and tracking systems? It's to make people aware of what their phone is constantly doing. Most people understood this, so this is a you problem. Now feel free to piss right off. K bye
Agree, the connection itself doesn't mean there's any actual data leaving your phone.👍 It's to tell the company server that the data on this phone is ready to be stolen in the next days, weeks or months.😂
Thanks for the video! We all know that these apps do this, but we don't necessarily think about it on a daily basis. I'm very interested in why China kids the alarm formation. They don't even have to tell us. What are you using at four where it's going. In fact, why do we allow anybody to do this? It's not the decision made by us, the users, that's for sure.
yeah all those domains are "Regionallized domains" since there are reasons why internet traffic would be locally routed. So say Tiktok operates globally so it will have domains in different regions or legal areas to serve local populations, the same is true of TEMU that may regionalize its content delivery.
Should note that certain apps could have their own DNS entries, bypassing your DNS settings. So you may STILL not see everything that your phone is connecting to. You really need to intercept signals or have something like wire shark for phones.
If you want to see some insane level of tracking just plug in an amazon tv, when I seen how much the amazon tv was tracking I unplugged it and threw it in the trash.
Oh, so thats why bloatware and un-uninstallable apps. I always had the feeling to not trust a operating system from a company like google. But they successfully made smartphones a neccesity of life.
Uninstall anything you don't actively use and remove apps you need for that one time thing (such as an app to book a movie or a show). You can always reinstall it if you need it again
One reason for consistent look ups is due to the device, a phone. The phone can be on a WiFi or cell tower at any given moment. Driving down the interstate it could be jumping towers every few seconds. The routing to the servers is constantly changing.. maybe that is why the apps want to know.. can you hear me now? How about now? oops can't get through, send notification that the app is disconnected.
Senior citizen. Should I get a free vpn does it work as well as payed for? Fixed incomes do not make for vpn costs honestly. I also don’t need nor want 30 or 40 a day alerts or whatever, it stresses me out. Some of us can’t stick to what we learn as memory is tricky and no retaining-hence stress! I don’t ask normally I figure things out myself but any advice you can offer, I just joined recently have not binged older vids. You CAN direct to there if necessary. Thank you🙏🏻😎
A VPN will only encrypt your information from A to B. It does not block on its own any excessive tracking done that will identify you and give information you may not want to give. Mullvad does offer blocklists as apart of their VPN package that may appeal to you but you may run into problems with connectivity to certain webpages when using any VPN due to VPN detection blocking from webpages. There are ways to bypass this using options within a VPN like Mullvad but it may be too tedious to be worth your time and also may slow your connection down. You may find the only way to connect to a webpage or service is to disable the VPN. AdGuard is probably a better route for you or some other similar solution for home wifi/lan. AdGuard also works on your phone if you use their app.
Proton VPN has a free version and is trustworthy. Others that are free may or may not make money off the data you send through them. Trust is the most important thing with VPN. Just remember to turn the VPN off while you are downloading and installing an update to that VPN app.
Liron is there an app that stops this "telemetry" aka sharing of information? With laptops there's spybot anti-beacon that does this but nothing for phones as of yet.....
Some VPN's have a trackers and ad blockers built in. I personally use NordVPN - geni.us/NordVPN-SFC (affiliate link but you do get a big discount and 3 extra months)
Good news - I tested the iPhone! New video coming soon🔥
@@LironSegev hi, pl test app named veryfit.......thx
Better question, why is harvesting your data NOT illegal? The EU bans violating your personal data privacy and has heavy fines for corporations that do it anyway. Why don't we?
There have been attempts to make laws to protect our data privacy, but they were not allowed to even hit the floor in congresss. Why? Are our congressmen being blackmailed or bribed by the big corporations?
Both last statements are affirmative
@nospamallowed4890 controlled by AIPAC blackmailed by Mossad
I would guess, corruption, collusion and conflict of interest are the reasons.
WE NEED A HARD WIRE ON/OFF SWITCH BUILT INTO EACH AND EVERY CELL PHONE . TAKE BACK OUR ELECTRONIC PRIVACY
@@nospamallowed4890 because both sides of congress are on the take.
Google does not make their money from selling expensive products, they're also not making billions from advertising. Your data is the product.
@@juliann1824 We are the product.
Bunch of scumbags charge us for the privilege.
@@juliann1824 we are the end product.
@@not-normal771 it's in their talmud and torah...check it out!
Not making billions from advertising? I doubt that, considering the sheer number of sponsored links in their search and alsp google ads
I was talking to my brother across the country just last night about a book I just published. As soon as we hung up, he went to Amazon and the book was suggested in the "Pick up where you left off" screen. He had never typed the name before. Yup, they are listening. Akerace Drill
try saying i fancy a caribbean cruise several times, i wish we could go on a cruise next year or shall we book a cruise. I tries it and not to my amazement I was suddenly flooded with cruise adds. I never typed anything in just said it allowed.
My best friend was merely talking about names for an animal in the household (not on the phone, no other listening devices) and that name came up the first time they used the phone after that.
@@stewartpalmer2456 last night I said “seriously” to my boyfriend 10’ away from my phone. Siri said “
Uh huh?” So unconsciously I started whispering LOL
@@stewartpalmer2456 we did some experiments on the UK and Serbia - mentioning obscure products in front of a couple of open laptops with FB running and sure enough ads popped up next days, and even emails. I discovered subliminal messages on TH-cam videos (almost certainly illegal), pre- programing people to support the Ukraine in the present conflict - and got friends across Europe to freeze-frame 'infected' videos to look for it - the results were different from country to country as to whether it was there or not and some other parameters (I don't recall them all precisely now). I also found a subliminal message telling people to vote for the Labour Party, years ago, in one of their seemingly innocent political brpadcasts - again it was almost certainly illegal. Whether it's a criminal offence or not I don't know, but having wasted my time reporting clear political fraud in the UK before, with police and electoral officers just not giving a toss, I just didn't bother to report it, sickening though it was.
@@78tag Yeah, that happened to me having a private conversation in my home with a friend. He was due to receive a lump sum of money and jokingly said he would buy a pre-paid funeral plan with it. Later on when I went on my phone, the ads I was getting were for companies that sell pre-paid funerals.
Big Brother is watching...and he's NOT your 'brother'. Great video Liron 🙂
He's that 1 big brother that in public defends his lil brothers from other bullies but behind closed doors, beats up his lil brothers that are too scared to tell the neighbors.
My stepfather had a Jitterbug flip phone. He switched carriers and they wouldn't use it, so it was shoved in a box for several years without being able to connect to a cell network. I found it because I kept hearing this weird noise - which turned out to be the LOW BATTERY sound. It still had several percent battery life after YEARS.
All the time it was in the box the microphone could pick up sounds, voices go easily through a card board box, all the time the microphone has been busy with collecting data, how many people there are in the house and at what time they are up or asleep. So now and then it connects to a network to send in a report. Then it switches itself off again, waiting to send a report next month.
@@vanhetgoor If the battery lasted several years, then I promise you that the microphone was NOT active.
@@larryboyd1872 Not all microphones need a battery to operate. Once I won a cheap watch on a county fair, in less than a year the battery was empty and the display stopped. A new battery would cost me ten times as mutch as the value of the complete watch. I stored the watch in a drawer somewhere. But many many years later, every time on a certain date the alarm would go off and it beeped. Sometimes an old battery is not completely dead.
Nothing is private anymore. Especially when you're dealing with the internet. Thank you for sharing.
the point is to take control again.
We need to do an organization that bans these crime against humanity.
Damn, looking at this stuff, I think its best to go back to the early 90s.
No. It's best to install GrapheneOS. It's actually doable, unlike time-traveling. lol
Already being worked on which is why it stays at home and I use an mp3 player and a digital watch for out door adventuring since I do most stuff on social media or on my email these companies are gonna learn the hard way.
I am experimenting with two solutions. The first is a dumb phone. It is a clone of an old Nokia (real Nokias are also available), and I don't even have a data plan for it. I pay less than $10/month for unlimited text and voice. However, nothing will keep your location from being tracked by the carrier, as they can triangulate your location off the towers. And the truth is that your SIM has its own processing power so who knows what it may be collecting and sharing. The second thing i am experimenting with is a FairPhone. It runs a de-googled version of Android and it has a lot of powerful privacy features. I really like it, but in the US it will only work on T-Mobile or one of their MVNOs. I am paying less than $30/month for unlimited voice, text, and data. However, another bonus is that it is user repairable with nothing more than a small screwdriver. In the U.S. it is sold by Murena, everywhere else it is sold by Fairphone or Murena.
In that zinc-plated, vacuum-tubed culture? 🖖
There are apps that block trackers...
Mahalo for a REAL eye-opener episode. You've made me even more relieved that I no longer carry a phone around anymore. Look at what I'm missing.
@jimcabezola3051 Just curious . . . What device did you watch this video on?
I've never carried my phone around very much. The main reasons are it's a pain in the rear (don't lose it, drop it, or accidentally leave it somewhere. I also don't want all the interruptions of my time by notifications, calls, & texts which can become 'like a ball & chain.' The other reason is we KNOW that EMF is NOT harmless whether it's ionizing or non-ionizing.
If my phone is in my purse and I'm driving somewhere, it's only in case I MIGHT need it or want it. If there's a long line at the bank or grocery store, I'm glad to have it to pass the time more quickly. More often, I forget it's there.
At home, I spend most of my time outside. I don't take my phone with me to mow the lawn or clean the pool, etc.
It can remain off for several days at a time, usually until I figure I should probably check for msgs.
Meanwhile, I have 3 tablets that are NOT synced to my phone & those are the devices I use the watch YT, Google something, play music or games, email, etc.
Sure, "they' can capture my on-line activity, what times I'm on or not on, but my location is gonna be pretty boring. My tablets rarely go anywhere, and when my phone is with me, it's usually off.
Curious to hear your logic, etc.
Always be on high alert when something was purposely misnamed from it's actual purpose. Especially when the "name" seems more trusting than the actual purpose.
For example, "app measurement" seems like like a neutral app to help your phone measure app data. But it's actual function is to track your private data.
The same goes for politicians. When the majority of them vote for a bill that is named something that is trusting, make sure it does exactly that and not the opposite or else.
Always remember that you are in control and everyone else benefits when they take that control away from you.
If it is a government bill, look for the words "child safety" cause that is the pill that they encapsulate the destruction of our privacy with. Child safety, always for child safety. You want child safety, right? We all want child safety even I want child safety. But not at the expense of encryption or privacy.
I have a tracker detector and blocker running in my phone. Google is in Everything! To be an Android app producer, you must allow this. Facebook allows sometimes a dozen trackers at one time. They dont even directly handle the data they scape. Your phone is 24/7 surveilance.
I use a degoogled phone [uses android open source project instead, which has no android apps in it] and don't have any apps on it that can compromise me to corporations unknown. No tiktok, amazon, etc.
I've been trying to convince people about the dangers of their phones and I've never had one who appeared to be interested in remedying the problem. people think about Security and assume that Privacy is the same thing. Many 'experts' on line don't seem to know the difference either.
Have you checked with Pi Hole or some other utility what DNS requests the phone is making?
@@robertsandy3794 Pihole and similar DNS solutions are not really suited to monitor such kinds of traffic. There are connections from hard-coded IPs (hard coded in the OS itself) that don't even show up, because there are no DNS requests. To fully grasp the situation, you would need to monitor the traffic with something like Wireshark.
Make sure gaps is removed.
GrapheneOS. Saving up to get one.
Normal people wont trade convenience for "security-holes", unless they have been in those "holes" themselves. People compromise easily when they dont see the immediate risks, let alone if they dont understand its working and effects. Education down to the basic is the only way, but not everyone will be willing to learn. We win some, we lose some. Saves what you can, but know when to let go.
My knowledge filled comment just got scrubbed 18 seconds after posting it . Thanks google For telling me my hypothesis is correct .
@@peachsncream5808 mind repeating the gist of it?
mind repeating the gist of it?
@@binsarm9026 I have
To respond , any more than a few words Is being removed 🤦🏻♀️
Yeah, my comments and replies always disappear too.
It gets much worse. My old flip phone used to use 0 battery power even if turned off for several days, but new smartphones seem to use about three percent of battery power overnight whether they're turned on or off. It seems that turning off only stops It from responding to user input. I suspect it is listening, tracking and reporting on what I do even when it is turned off.
@@johnmoran1481 that's not a real test. The phone is going to spend a lot more energy restarting than sitting idle in the same time. It's not unusual that if you record the starting battery %, shut down, start, and record the % again when it's ready, the % will have decreased.
Even off, the devices around can detect it !
@@weevilsnitzyes but leave your phone off for a couple days and you’ll lose more that just that bit of start up juice. So it’s doing something. I went hunting with zero cell coverage so turned my phone off at 95%. When I turned it back on 5 days later it was under 80%. It’s an iPhone 15, that tells me it wasn’t really “off”.
Nobody turns their phone off. When you press the button on the side and the screen goes dark, you’re only putting it to sleep.
If you actually turned it off, then it will stop using power.
easy soilution - remove the SIM overnight...
It's sad that we have gotten to a place that this is acceptable and few seem to care and little is being done about it. Also on your next test see if after you "uninstall ???" the app such as TikTok does it still keep stealing your data.
Bursts: most apps can't remain active due to recent Google services limitations. Thus, they use Google services to activate their service and thus have to do their job when Google allows them. As far as I recall, they have 90 seconds before getting disabled again.
Hey Liron, what an interesting video! Watched till the end :) I would really like to see you make the same video but with an iPhone just out of curiosity :D. But this video and many of your videos in general have opened my eyes!
Noted! And thanks for watching!
I can tell you they do pretty much the same thing. I noticed all the domains my phone reached out to and blocked them on my home network. I don't do social media but for some reason my phone calls out to Meta, TikTok, and Snapchat. I don't have anything to do with any of them.
Really enjoyed that video. As you alluded to that not all websites are showing the tracking behaviour because they are employing other methods to extract that precious data from your device.
Great video! Don't forget that DNS is very often used to send data "home" as opposed to looking up an IPv4/IPv6 address. Although originally just a technique for "bad actors" to exfiltrate data, it's now used by "legitimate" companies too. It would be interesting to see if any of the lookups contained long hex strings in the queries that were bursting.
Very interesting video, and thanks.
Please make similar video for a De-Googled phone.
It's like living in the Truman Show times two with A bunch of Corps bidding on your energy.
This is no surprise for Android phones. Would you be able to do the same test for iPhones?
so far, yes but am still checking
Depends upon which version of iPhone, and even the iPhone size and other items.
Note that when they came out with items such as the iPhone 16 pro max, that they also essentially discontinued most of the iPhone 15 line? iPhone 16 includes items which *they claim* make it more secure in case of loss or theft. Some of these items are not ever available to be bypassed or turned off. For most any iPhone, also consider it is always being tracked by the carrier, always sending out IMSI, always looking for WiFi and Bluetooth, especially low power Bluetooth.
It still collects data and sends to the same places
@@ClausWawrzinek Apple tracks you.
Apple is even worse than Google.
Great information its time to not have a phone on or even batter connected and maybe wrapped in tinfoil...
An absolute eye opener for sure. If our devices are Dopamine farms, does that make developers the Dopamine farmers? Lol
Appreciate the video, gained some good insight here as always.
Yes it does!
I think that you already had a question about IPhones and if they have the same issue. Looking forward to your next video on if this applies to IPhones and how to stop this activity. Love the videos.😊
Yup. Am on it
I'd like to know what phones are doing when they're supposedly powered off.
@@dwaynenewton1 what's the phone doing when off you ask?
It's doing the same as a guy wearing hat and sunglasses while pretending to sleep in same room as you, listening and watching your every move.
Can you say :"hello big brother" ?
Seeing the data on this would be very interesting
Technically speaking they are off. The OS is not running. If you leave it off for 2 months your power level will be near the same. That said the sim uses a very low quiccent (micro) current level
But some secure facilities require you to deposit your phone into a copper mesh faraday cage in case it was compromised or you are an agent.
RFID tags are powered externally through EMF
@@donh8833 I have a phone that dies within a week when powered off. Sent it for warranty service and it doesn't hold a charge.
They only ping towers for tracking says Snowden and my battery dying while off
Thank you, Liron.
Pocket stalkers are awful. Digital stalking ought to be as legal as personal stalking.
Some awesome questions here! I am working on a follow-up video to answer your questions so keep them coming!
Reckon it's possible to do a similar test with a iPhone ? A teenage girl with an iPhone and the results would be super scary 😆
Tracker Control and Warden are 2 apps that can check for spyware, well, most apps have them. But try those apps out, can help you block ads as well!
It can give you a lot of information as well.
- Darkijah
Tracker Control can also block internet for an app totally, if you push the icon, it becomes greyed out.
The "bursts" include GEOLOC data - this is the infamous (We know where you are at any given moment) part of this tech...
Are you South African?
This is something I always wanted to try doing. Very interesting finds, this is one reason I largely dont download apps and just use my mobile browser when possible.
Sir,
Very informative video. Government should restrict these companies to steal data of people without their permission but these companies are paying millions of dollars to government, therefore, no such restrictions. Ultimately people are paying the price.
Saar government doing nothing saaar. They taking million dollars saaar
Well you read and accepted the terms of service and privacy policy, didn’t you?
@@nickplays2022 Definitely, but isn't it a blackmail that in leau of technology companies are compelling people to accept their terms and conditions. Secondly, if people have more options who will accept to compromise with their data. Yes, government has capabilities to restrain these companies but as mentioned the reason it is silent.
@@nickplays2022 I'm dyslexic, I only know I need to push the Yes button for it to work ... /s
Can you do the same test with for example the Whatsapp app and Signal app? I'm curious to know what these apps do.
If so, then he should do the test with a wireshark in between and not these children's games with Pihole.
Excellent work!
I wonder if the devices save the info and send it back while not connected to the Internet.
Also what are all the mystery folders with no items inside doing on my device?
TBH, this is the reason I have gone back to an old flip-phone. I'm just done with all the tracking, all the listening, all the meta data acquisition.
Seriously. I'm about to just get rid of my phone altogether.
there is a lot we don't get to see...now imagine what is happening with all our cars where get to see even less?!?!
I have looking at old phone .
@@LironSegevcomputers central including CONTROL of your car! 🤔🧐🤨
buy a blockchain or Rob Braxman phone
@@cheery-hexI don't see how purchasing one of these would assist. They all still will make DNS requests.
The real question would be once the phone is not at home, what facility will allow us to blacklist these DNS requests without rooting our phones
I realised, that in some case, especially belongs to Google, your phone is listening to the environment too and transfers it to Google. This was when I was near people who talked in ukrainian language - when I then searched for a place, Google maps were written in ukrainian language. Other time, when I was near people, who talked turkish, Google maps went turkish. By the way, PI-Hole seems to be used for MITM attacks...
Apples is just more exclusive about it. All in all it is one big gang and interchange.
It would be interesting what apps are blocked on this same phone after installing the Duck Duck Go web browser and turning on the background blocking tracking feature.
@@Skiddy1963 Eye opener about Duck Duck Go: In particular, it doesn't encrypt search terms in the URL bar. Also, your data can be monitored if you share it on third-party websites or through online forms.
Would be interesting to see again after you have "deleted" the said APPS !!!
once the apps are uninstalled there was no more connections from those apps
Those apps might stop but the phone still has services that send data. Mine was sending tons of data to Chinese servers, because that's where it was made. This might depend on the manufacturer, of course.
stick a firewall in between your router and modem, and record at least the packet size, amount of data being sent. If you have the means, you can decrypt the SSL and see what is leaving.. but this tends to be expensive gear.
Very interesting! Thanks Liron!! 👍
My pleasure!
I think a more useful information would be to identify which apps are making those requests and not just which domain they are contacting. For example, if the amazon app tries connect to tiktok, you would blame tiktok although the request came from a different app. Knowing which app is making the request can let the user decide if the app is worth it. Just my thought. Nice video though. 👍
Great content, just subbed. What about a more deep dive into this? As you mentioned, can you track the ip addresses the phone connects to via our router and see where it goes, can we block them on a network level, can we create a system on our phones that'll block the device being connected to those (without root), etc etc
Hi @LironSegev great video. I notice you used an Android device. But how do Apple devices behave?
working on that now
@@LironSegev I can't wait to see your findings
There are a number of phones running OS's that supposedly focus on privacy. It would be interesting to repeat the same tests on one of these.
What would happen if apps were disabled?
no traffic was reported if an app was disabled or removed.
@@LironSegevbut how come apple keeps using data for "uninstalled apps"?
@@aliceg1212That's only a track record for how much TOTAL data was sent over internet. Also, iOS behaves differently and will have a very different domain list
So, how do we stop this?
@@Redwan777 but you can empty that counter... and when it starts again it keeps counting data for uninstalled apps... 🤷🏻♀️
Super helpful video liron cheers 🤩
Glad to hear!
Phones being by nature a social networking device I believe will always have the problem of unwanted analytics creeping in. I would never consider a phone a safe device for any kind of storage for important information. Edit: Malicious actors will always be seeking to abuse these loop holes.
Phones been tapped since their invention, but never on this industrial scale or these type of actors.
Hi, thanks a lot for the very useful video! Could you please do the same with a Huawei phone which doesn't have google to see where it connects?
Thanks a lot!
TikTok had all those domains built in. I wonder how many are changed/added every time the app is updated?
I basically run my phone like an old Nokia. No banks, like 2 added apps. No location, bluetooth, wifi connected, no auto updates, no auto nothing, yet if I don't plug it into the charger at night, I lose 50% of battery, starting at 100%. If it starts at less than 100% and I forget to plug it into the charger, it uses up all he battery as I sleep, then turns itself off.
I have no idea what it's doing.
Cheap Samsung, tmobile, Samsung internet.
Modern phones use more battery than nokias, altrough dunno if it should eat up more than my laptop but then again, a laptop uses more processing power to run stuff than a phone.
Don't mind it too much.
Lithium Batteries deteriorate sharply after 2-3 years. If new battery, shorter than expected battery life is a sign of spyware.
Interesting, but somewhat flawed experiment.
1. A DNS lookup means a connection is being made, but it does not mean any data will be sent. In fact, certain applications create all their connections when starting up. Practically, you don't know what data is being collected and tracked.
2. Of course there will be multiple connections to Amazon subdomains, for different services and APIs. It can all happen at once because the application just creates connections at startup.
3. When you are not logged in, it still is very likely that connections are being made on startup anyway and is not necessarily a sign of tracking. I am sure there might be tracking, but not to the extent you are alleging.
4. Not all API calls are for tracking.
5. For Firebase, some "tracking" is to know what parts of the app you are using, e.g. if you used a certain feature or not and how frequently. This info, in anonymized aggregate, is useful to app builders to improve their apps.
Privacy is a myth since 2001, even worse, we are training AI for big tech companies and everything for free
Apple does it too
Time to put the phone in a Faraday cage. LOL
Great information. Keep up the work.
Could you try with an iPhone? I am pretty sure it will be similar but I am curious. Thanks
good idea
I would suspect that there will be a difference with regard to the google connections as Android is basically a google phone….????
Phones are worse -- especially the 16.
@@Piano_Castle More discrete and hyped about it.
Hey Liron.
Wow, that is hectic!
I did see your VPN video about a month ago. What I do is keep Proton-free VPN on. On a reboot of the phone make sure is on
I almost set it and forgot it.
I do understand not everyone will, but it is a good habit to get into.
Take care.
Just remember to turn off the Proton VPN app before you update it. I keep forgetting and it gets stuck halfway.
@@gwaeron8630 That is true. I forgot to add that. At first, it stumped me. I was like, "Oh, disconnect the VPN." Thanks for the info.
Always the most informative information thank you so much for what you do and all your hard work❤
Appreciate you 🔥
I didn't fully scroll through all of the comments to see if this had been asked yet, but it seems pretty worthwhile to get an answer. What lists did you configure pie hole with and how can we get them?
Great episode Liron. I would appreciate if you add an iPhone device to your testing. Thank you.
Seems Mark is upholding his word!
He really had tried to improve over this recent year!
This is insane! I'd like to see how one of those "de-googled" phones performs in this test. Meanwhile the few politicians that might care should be notified that this invasion of privacy must be stopped.
Keep up the good work mate form melbourne
As always GREAT information, Thank you.
Amazing video.... thank you!!!
Well, as someone who was born with the paranoid gene fully enabled, this doesn't really surprise me. I do share your bewilderment as to why so many in such a short amount of time. And this kind of activity is why when you travel, be sure to find out ahead of time what the roaming charges might be, as some countries have very high charges and one might think well I didn't use my phone for anything, so why do I have a $6,000 cell phone charge? If you do travel to such a country, keep your phone in airplane mode at ALL times unless you are using a wi-fi connection.
Thank you for the info.
Companies expect you to collect data on yourself and send it to them on your own dime. How they are able to do this without expecting to pay me for my time, data, the traffic of sending that data to them, is sort of mind boggling. Thet set it up so they get 100% benefits with 0% cost. It's all on us. We provide them with our own data at our own expense.
thank you sir. would love to see more related content on this. Love and appreciate your work.
Noted
The fascinating thing I found is that my cell phone, whose expired SIM card is from another continent and has not had service for years...
still has full GPS capability. Meaning if I open up Google maps it will show me exactly where I am. And this feature even worked when I was lost in the mountains of Bulgaria.
GPS is receiving only.
@@turtlefrog369 ok, maybe I don't know much, but doesn't the tower have to SEND the location for my phone to know where it is? So the tower knows where the phone is 24/7... even though I have no service and the card isn't compatible with any local network.
@@rageonyx GPS is completely separate from SIM card, takie off your tinfoil hat and read about GPS technology.
@@rageonyxGPS satellites constantly broadcast signals. A GPS device then can calculate the distance to the satellite.
So the device needs to receive GPS signals from at least three to four satellites, to be able to calculate its own position.
At no point does the device communicate with the satellite. Think of it like a TV satellite, where you also only can receive signal.
@@rageonyx cell towers are not GPS. although i am sure cell towers can act ike like GPS satelites maybe. There are different location services being used in phones. GPS, cellular and wifi. GPS is the most secure because its recieve only.
Looking forward to the next video, hope this is the first of a series
Going to try and see what iPhone does and trying to get other non DNS data too (much harder without rooting a phone which I am not keen on doing but well see)
i would be curious to see this same experiment with an iOS iPhone - apple marketing makes the claim its privacy first
On it
Privacy and data gathering are different things. You might still have everything you're doing being watched, but maybe Apple is a little more cautious about releasing your data to outside companies.
@@mediocreman2 Very true, however it would be interesting to see the practices which Apple are using versus Android - given lots of people trust the security of Apple vs Android.
Apple talk big, but no privacy with junk security. Read the bug-fix logs and cry.
@@tailscape Misguided. Talking from experience.
I understand there is a lot of telemetry going on from you sim card that won't show up because the traffic doesn't use the phones OS. I only read about it and know nothing else about it.Thanks for the information sir
The sim based phone connection is a tragic separate issue, that comes on top.
Also cheaper solution: If you're the only one in your PC who is upset with different staff, you may use "hosts" file or sinkhole it on router if some more ppl or devices would want to benefit.
Well said. Very well said.
Appreciate you being here 🔥
Hi. Great video, but if you are not logged in to those apps, can you still use the app without logging in? Thanks
No. You can't use the apps without logging in. It's like you can't use your banking app without first signing in
@@LironSegev thank you :)
@@LironSegevCan you not just go on to the internet, log in to them but not have them downloaded on your phone??
@@Inisfad Sure you can. I don't have Amazon, Facebook, or much else for that matter on my phone. If I want to use any of those services, I use a web browser and login as required. If those services had something where I had to use an app, it is unlikely I would use the service, but I could use a spare phone that is normally turned off. That spare phone has LineageOS installed plus it does not have mobile data access.
crazy that these apps are constantly running in the background instead of being suspended when idle.
Agree. An idle smartphone should have a week battery life in standby.
If one is really concerned about surveillance, Then obtain an old phone with no GPS & a removable battery. Additionally obtain a portable faraday container to blind the phone from the wireless internet. 😎
I'd be interested in knowing if there are still things being sent when the phone is turned off.
He was literally talking about that all the time. Do you have trouble understanding English?
@@Karel8X I meant completely powered down. On most you can't remove the battery anymore.
@@Troy_Built Would be complex. You would need to monitor the radio, wi-fi and blue tooth connection in it's full spectrum.
Thank you very much. 😮🙏
Oh my! This explains why the government UK are not pushing identity cards - not needed.
Great video, so what is the solution? , is there an app we can use that blocks these domains,?
Please go into further detail on the different type queries, such as A, AAAA, and HTTPS. What are they doing? And type look-ups, such as CNAME and IP. What's the difference?
I too have been using Pi-hole for years. What's even scarier is watch the queries increase once you plug the phone in overnight. Once you begin blocking certain things, it irritates the device and software into frantically pinging those IP Addresses all night. It's like the device knows it's connected to the Internet, but can't achieve it's goal.
this video is great info for android phones. do you have one about iphones? do they do the same things? would be great to know since we cant get into the device to alter the ip address
Yup. Coming soon just wrapping it up. Stay tuned
@@LironSegev Awesome! thank you
Google owns Android OS, as you as boot img starts, your android based phone needs to talk to mother Google
The connection itself doesn't mean there's any actual data leaving your phone. You are listing DNS requests and not actual communication, so all of this is BS.
It ok if you didn't understand. The entire point wasn't the data, you need Wireshark to see that. The point was the simple questions: why do so many connections get made? Why are so many of them to ad and tracking systems?
It's to make people aware of what their phone is constantly doing.
Most people understood this, so this is a you problem.
Now feel free to piss right off.
K bye
@@LironSegev It was the guy from google :)
Agree, the connection itself doesn't mean there's any actual data leaving your phone.👍
It's to tell the company server that the data on this phone is ready to be stolen in the next days, weeks or months.😂
Thanks for the video! We all know that these apps do this, but we don't necessarily think about it on a daily basis. I'm very interested in why China kids the alarm formation. They don't even have to tell us. What are you using at four where it's going. In fact, why do we allow anybody to do this? It's not the decision made by us, the users, that's for sure.
yeah all those domains are "Regionallized domains" since there are reasons why internet traffic would be locally routed. So say Tiktok operates globally so it will have domains in different regions or legal areas to serve local populations, the same is true of TEMU that may regionalize its content delivery.
Should note that certain apps could have their own DNS entries, bypassing your DNS settings. So you may STILL not see everything that your phone is connecting to. You really need to intercept signals or have something like wire shark for phones.
Yup. As I said
14:16 NoRoot Firewall can show that data. somehow but I don't even know how.
If you want to see some insane level of tracking just plug in an amazon tv, when I seen how much the amazon tv was tracking I unplugged it and threw it in the trash.
Oh, so thats why bloatware and un-uninstallable apps. I always had the feeling to not trust a operating system from a company like google. But they successfully made smartphones a neccesity of life.
Uninstall anything you don't actively use and remove apps you need for that one time thing (such as an app to book a movie or a show). You can always reinstall it if you need it again
If you knock on a door and there is no answer you tend to knock again.
Only a stalker or a salesman keeps knocking on a door that nobody answers
@@jbrock8596 🤣 👍
Do iPhones also allow tracking?
One reason for consistent look ups is due to the device, a phone. The phone can be on a WiFi or cell tower at any given moment. Driving down the interstate it could be jumping towers every few seconds. The routing to the servers is constantly changing.. maybe that is why the apps want to know.. can you hear me now? How about now? oops can't get through, send notification that the app is disconnected.
I don't know, but I think the modern phones system maybe is a bit more advanced.
Senior citizen. Should I get a free vpn does it work as well as payed for? Fixed incomes do not make for vpn costs honestly. I also don’t need nor want 30 or 40 a day alerts or whatever, it stresses me out. Some of us can’t stick to what we learn as memory is tricky and no retaining-hence stress! I don’t ask normally I figure things out myself but any advice you can offer, I just joined recently have not binged older vids. You CAN direct to there if necessary. Thank you🙏🏻😎
A VPN will only encrypt your information from A to B. It does not block on its own any excessive tracking done that will identify you and give information you may not want to give. Mullvad does offer blocklists as apart of their VPN package that may appeal to you but you may run into problems with connectivity to certain webpages when using any VPN due to VPN detection blocking from webpages. There are ways to bypass this using options within a VPN like Mullvad but it may be too tedious to be worth your time and also may slow your connection down. You may find the only way to connect to a webpage or service is to disable the VPN.
AdGuard is probably a better route for you or some other similar solution for home wifi/lan. AdGuard also works on your phone if you use their app.
Proton VPN has a free version and is trustworthy. Others that are free may or may not make money off the data you send through them. Trust is the most important thing with VPN. Just remember to turn the VPN off while you are downloading and installing an update to that VPN app.
@@gwaeron8630 Thank you so much🙏🏻🫡
It would be fantastic, if You wuld do the same test with Graphene OS for comparison!
Plain and simple. If you’re that worried about it. Turn it off until you need to use it briefly. Or get an old burner phone
The off switch don't work, and the battery can't be removed ...
@@iRelevant.47.system.boycott
You have to hold the button down for a couple seconds, not just a tap to turn the screen off.
Those old flip phones look better and better every day.
Thanks Liron
If you want a detailed vid on how your phone spies on you, look up the Vice/Snowden interview.
Liron is there an app that stops this "telemetry" aka sharing of information? With laptops there's spybot anti-beacon that does this but nothing for phones as of yet.....
AdGuard
Some VPN's have a trackers and ad blockers built in. I personally use NordVPN - geni.us/NordVPN-SFC (affiliate link but you do get a big discount and 3 extra months)
Try Quad Nine DNS
It's sad that stuff like this is legal for companies to do.
Yup. Terms and Conditions are their get-out-of-shit card....and none of us read those
@@LironSegev It is almost like an insurance contract and the small print ...