← Back to Concept Index

mobile-device-privacy

The chapter focuses on the privacy risks inherent in using standard mobile devices tied to Apple or Google accounts, which constantly transmit personal data.

2 chapters across 1 book

Extreme Privacy: What It Takes to Disappear (2024)Michael Bazzell

Chapter 4

This chapter emphasizes the critical importance of replacing one's mobile device and cellular account to achieve advanced privacy and security. It critiques the pervasive data collection practices of Apple, Google, and cellular providers, highlighting risks such as location tracking, data breaches, and legal vulnerabilities like geo-fence warrants. The author advocates for purchasing new devices with cash, avoiding used or factory-reset phones, and using custom Android devices with un-Googled software to minimize data exposure and maintain anonymity.

Chapter 6

This chapter from Extreme Privacy 5th Edition focuses on strategies for maintaining privacy with mobile devices, emphasizing the risks of constant cellular connectivity and advocating for disciplined use of airplane mode and Wi-Fi to prevent location tracking. It discusses the use of GrapheneOS for enhanced control, the importance of Faraday bags to block wireless signals, the utility of decoy phones with broken screens for social engineering and privacy, and the necessity of having an emergency phone for 911 calls without compromising anonymity. The chapter also highlights the need to block cameras and microphones to prevent covert surveillance.