Unconfigured Ad Widget

Collapse

How all phone calls are recorded and does a vpn work?

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • hermosabeach
    I need a LIFE!!
    • Feb 2009
    • 19288

    How all phone calls are recorded and does a vpn work?





    Interesting explanation how things work in a digital world



    Z
    Rule 1- ALL GUNS ARE ALWAYS LOADED

    Rule 2 -NEVER LET THE MUZZLE COVER ANYTHING YOU ARE NOT PREPARED TO DESTROY (including your hands and legs)

    Rule 3 -KEEP YOUR FINGER OFF THE TRIGGER UNTIL YOUR SIGHTS ARE ON THE TARGET

    Rule 4 -BE SURE OF YOUR TARGET AND WHAT IS BEYOND IT
    (thanks to Jeff Cooper)
  • #2
    surfdesigner
    CGN/CGSSA Contributor
    CGN Contributor
    • Dec 2014
    • 206

    Rob Braxman is great. He also sells Android phones that work on any network but have been software hacked to eliminate tracking/data harvesting. Of course he has been censored by BigTech.

    Comment

    • #3
      Rizzo
      Member
      • Aug 2012
      • 444

      Never heard of him before.
      Interesting stuff.
      Thanks for providing the video.

      Comment

      • #4
        Robotron2k84
        Senior Member
        • Sep 2017
        • 2013

        NSA records all calls / texts. So what if your carrier does it too, and then leaks the data.

        Automatically assume that the phone in your pocket is listening all the time / sharing your data.

        Comment

        • #5
          hermosabeach
          I need a LIFE!!
          • Feb 2009
          • 19288

          I wonder what % of people in the US have a "voice profile" so within 15-30 seconds of talking, the NSA or Google or FaceMetaBook can tag you as the person speaking?

          Burner phone
          Face features scanned when you buy
          Any other phone near burner phone - ties 2 phones together
          GPS in Toyota and GM vehicles for SOS overlays with burner phone to show ownership

          Voice print -
          Typing profile identification
          Wifi access - they know who has what wifi hardware
          Rule 1- ALL GUNS ARE ALWAYS LOADED

          Rule 2 -NEVER LET THE MUZZLE COVER ANYTHING YOU ARE NOT PREPARED TO DESTROY (including your hands and legs)

          Rule 3 -KEEP YOUR FINGER OFF THE TRIGGER UNTIL YOUR SIGHTS ARE ON THE TARGET

          Rule 4 -BE SURE OF YOUR TARGET AND WHAT IS BEYOND IT
          (thanks to Jeff Cooper)

          Comment

          • #6
            hermosabeach
            I need a LIFE!!
            • Feb 2009
            • 19288

            Braxman is dry but I have learned a ton about tech from his videos
            Rule 1- ALL GUNS ARE ALWAYS LOADED

            Rule 2 -NEVER LET THE MUZZLE COVER ANYTHING YOU ARE NOT PREPARED TO DESTROY (including your hands and legs)

            Rule 3 -KEEP YOUR FINGER OFF THE TRIGGER UNTIL YOUR SIGHTS ARE ON THE TARGET

            Rule 4 -BE SURE OF YOUR TARGET AND WHAT IS BEYOND IT
            (thanks to Jeff Cooper)

            Comment

            • #7
              SoldierLife7
              Joe Exotic For President
              CGN Contributor
              • Apr 2013
              • 2420

              Originally posted by hermosabeach
              I wonder what % of people in the US have a "voice profile" so within 15-30 seconds of talking, the NSA or Google or FaceMetaBook can tag you as the person speaking?

              Burner phone
              Face features scanned when you buy
              Any other phone near burner phone - ties 2 phones together
              GPS in Toyota and GM vehicles for SOS overlays with burner phone to show ownership

              Voice print -
              Typing profile identification
              Wifi access - they know who has what wifi hardware
              A few of these are things I have never even considered.

              Comment

              • #8
                Yugo
                Calguns Addict
                • Feb 2011
                • 8359

                Originally posted by surfdesigner
                Rob Braxman is great. He also sells Android phones that work on any network but have been software hacked to eliminate tracking/data harvesting. Of course he has been censored by BigTech.
                sells them where exactly?
                sigpic

                Originally posted by WAMO556
                Voting for Donald Trump is the protest vote against: Keynesian economics, Neocon wars, exporting jobs, open borders, Washington criminal cartel, too big to fail banks and too big to jail pols and banksters.

                Cutting off foreign aid to EVERY country and dismantling the police/surveillance state!

                Umm yeah!!!!!

                Comment

                • #9
                  hermosabeach
                  I need a LIFE!!
                  • Feb 2009
                  • 19288

                  His web site in in the videos. It is something like braxxman.me
                  Rule 1- ALL GUNS ARE ALWAYS LOADED

                  Rule 2 -NEVER LET THE MUZZLE COVER ANYTHING YOU ARE NOT PREPARED TO DESTROY (including your hands and legs)

                  Rule 3 -KEEP YOUR FINGER OFF THE TRIGGER UNTIL YOUR SIGHTS ARE ON THE TARGET

                  Rule 4 -BE SURE OF YOUR TARGET AND WHAT IS BEYOND IT
                  (thanks to Jeff Cooper)

                  Comment

                  • #10
                    WoodTurner
                    CGN/CGSSA Contributor
                    CGN Contributor
                    • Apr 2010
                    • 286

                    Originally posted by hermosabeach
                    I wonder what % of people in the US have a "voice profile" so within 15-30 seconds of talking, the NSA or Google or FaceMetaBook can tag you as the person speaking?

                    Burner phone
                    Face features scanned when you buy
                    Any other phone near burner phone - ties 2 phones together
                    GPS in Toyota and GM vehicles for SOS overlays with burner phone to show ownership

                    Voice print -
                    Typing profile identification
                    Wifi access - they know who has what wifi hardware
                    If concerned about that level, you should really be ditching a phone and just going with a laptop thats WiFi chip can go into monitor mode, running something like parrot on a flash drive, and know how to use it's built in MAC spoofer to make everything else think it's a MacBook. As well as using default TOR browser in windowed mode at it's default windowed size. Being proficient at opsec to a state level is very difficult.

                    Comment

                    Working...
                    UA-8071174-1