Como nossos smartphones nos espionam e o que você pode fazer para evitá-lo

By Bitcoin Revista - 1 ano atrás - Tempo de leitura: 6 minutos

Como nossos smartphones nos espionam e o que você pode fazer para evitá-lo

Como um Bitcoiner, being aware of all the ways technology is used to spy on you is paramount to good opsec.

Este é um editorial de opinião de Anthony Feliciano, um Bitcoin organizador de eventos e consultor.

Não é nenhum segredo que vivemos em um estado de vigilância em massa. A tecnologia criada para nos ajudar a ser uma sociedade mais eficiente em termos energéticos e produtiva é agora a nossa maior ameaça à nossa privacidade e ao nosso bem-estar autossoberano. Dê uma olhada ao redor - de geladeiras inteligentes a lâmpadas inteligentes, câmeras de babá a TVs inteligentes, computadores, Anel, Google Nest, Alexa and our smartphones are all capable of being used to spy on us, and that's just the list of equipment that is doing it before you step outside of your house. They’re all equipped with cameras, sensors and microphones that watch and monitor our every move, emotion and action. Many people will point to the ato Patriota, quando o governo dos EUA começou a espionar as comunicações dos seus próprios cidadãos, sob o pretexto de “segurança nacional”.

This will be a two article series, starting with the piece that explains “why” — why you should begin to formulate an opt out plan when it comes to your smartphone, even more so if you are a Bitcoiner. The “why” doesn't necessarily apply to only Bitcoiners but for anyone looking to regain their privacy, like journalists and/or people who live in oppressive regimes.

The second part will be the “how” — I'll provide you with tools and options to help you begin your opt out journey while still being able to use Bitcoin.

Como os provedores de serviços celulares nos espionam:

I'll start with cellular providers and talk about some of the tools at their disposal that are currently employed. Some of these terms and tools you probably have heard before, but might not be sure how they work. The important takeaway to remember is that the information captured from these tools can be subject to intimação por advogados ou agências governamentais.

Smartphones da marca da operadora: esses são os telefones que você “aluga” de qualquer operadora em um programa de pagamento mensal. Eles vêm pré-carregados com vários aplicativos da marca da operadora e que não podem ser removidos. A maioria dos aplicativos é específica da operadora e registra os dados inseridos neles, bem como rastreia outros aplicativos.

AT&T Secure Family e o aplicativo Google Play são dois exemplos – “Encontre sua família, controle o tempo de tela do seu filho e gerencie o uso do telefone.”

As principais características incluem:

This app may share data with third parties.This app may collect location and personal info.Data is encrypted in transit.Data cannot be deleted.Mobile OS: A mobile OS is the operating system your smartphone uses, and is like a version of the Windows, macOS or Ubuntu on your personal computer. Today the smartphone market is dominated by two players. Google and Apple. By agreeing to the “terms and conditions” to use Google or Apple services, we give access to every aspect of our life, both private and public, to them. When people complain about Big Tech spying on us, it's really our own fault since we don't have to use any of these services.

*Observação: discutirei dois projetos para ajudar os usuários do Android com seu plano de desativação. Desculpe, usuários da Apple, vocês terão que esperar até que fique mais fácil fazer o jailbreak de um iPhone.

Apps: Too many of them are on our smartphones. When was the last time you downloaded an app that didn't need access to every part of your phone to work? Nearly every app we download needs access to our contacts, phone, texts, photos, GPS location etc. All with the emphasis on “collecting information for better customer experience.” With the rise of malware apps targeting cryptocurrency users, shouldn't we be paying more attention to the apps we install and the permissions given to them, since we too have Bitcoin and LN apps that reside on our phones as well? Trilateração: GPS. Nossos telefones celulares enviam sinais constantemente procurando receber sinais de “reconhecimento” de torres de celular próximas. Quanto mais torres nossos smartphones se conectarem, melhor será a precisão para identificar sua localização a poucos metros.

*Note: Not even turning off your GPS is foolproof. That is because our smartphones are still connected to nearby towers via the radio inside them. This won't pinpoint your exact location but just enough to provide the necessary information as to your whereabouts at a particular time.

Ataques de troca SIM: This is when a scammer is able to pose as you (through social engineering), and calls your cell service provider to trick them into porting over your cell number to a SIM in their possession. The goal is to receive one-time access codes to your accounts. In Bitcoin terms, the targets here are usually centralized exchanges. This was the case when a scammer used a sim-swap attack to receive a one-time code and withdraw the victim’s criptomoeda. There are many other such horror stories involving SIM swap attacks with the goal to clean out someone's crypto accounts. Stingrays: Physical hardware used by government agencies around the world. The premise behind the attack is that Stingrays operate as “fake” cell phone towers by providing a stronger signal, so that your smartphone believes it is talking to a nearby tower, when in fact, some agency is operating as the man-in-the-middle, recording all data (text, calls, and data) transmitted from the person of interest. The major issue with this, anyone who happens to wander by the intended target has all of their information captured as well. Everyone in the vicinity’s privacy is at risk when this tactic is used.Social, political or economic injustice rallies: If there was ever more of an example on why you should use a burner phone or privacy focused device for these events, it was the fallout from the Rally dos Caminhoneiros Canadenses e os eventos de 6 de janeiro de 2021. Nos meses que se seguiram aos acontecimentos, os governos trabalharam com as Big Tech para rastrear e prender uma série de pessoas, apenas visualizando seus feeds de mídia social ou intimando registros de telefones celulares das operadoras. Esses registros de telefone celular foram usados ​​para determinar se você estava perto de tais protestos, a fim de processar indivíduos. Devo enfatizar isso novamente: nunca leve seu telefone diário para um comício desse tipo. Sempre traga um telefone reserva que você possa abandonar ou destruir, não importa o que aconteça.

Como começar a cancelar

Para começar, vá para Calyx OS or Graphene OS to do some light reading. These two projects are similar in nature and offer a great alternative mobile OS that is free of Google services and all the tracking included. Their respective websites have a list of compatible devices and installation guides. The two projects have grown the most in popularity amongst Bitcoiners. I will post links to apps I use for privacy as well as Bitcoin and LN apps that you can use in conjunction with a de-Googled phone, so you can still use Bitcoin without all the spying and tracking.

Privacy is a right, we all should remember, and not take it lightly or sacrifice it for convenience. Nothing is 100% secure and private, unless you are planning to go live off the grid in the mountains. If your wife isn't thrilled about that idea, at least begin to explore an opt out plan when it comes to communications and Bitcoin.

Este é um post convidado por Anthony Feliciano. As opiniões expressas são inteiramente próprias e não refletem necessariamente as da BTC Inc ou Bitcoin Revista.

Fonte original: Bitcoin Magazine