The video discusses the privacy concerns associated with SIM cards in mobile phones, highlighting three main reasons to be cautious. First, it explains how SIM cards enable constant location tracking through communication with cell towers. Second, it delves into the autonomy of SIM cards, particularly proactive SIMs that can send hidden messages to the cell network without the user’s knowledge. Lastly, it explores the potential risks of having too much control centralized on a single device, particularly in terms of split tunneling with VPNs.

Then Naomi shares personal reasons for not using a SIM card in her phone, emphasizing alternatives such as relying on WiFi, using an anonymous Calyx hotspot, or considering mobile hotspots. The benefits of these alternatives include increased privacy, the ability to control VPN usage, and reduced exposure to potential hidden messages sent by SIM cards. The video also touches on potential downsides, such as the need to carry multiple devices and potential connectivity issues when using hotspots.

  • TexMexBazooka@lemm.ee
    link
    fedilink
    arrow-up
    20
    arrow-down
    2
    ·
    11 months ago

    This is such a weird thing I’ve noticed on this community. There was a guy not too long ago that would make new accounts like daily so he wasn’t posting under the same username and it’s like… why?

    I get you want privacy, but there’s a line where it just stops making sense, and your personal info isn’t that valuable. Anyway

    • ExtremeDullard@lemmy.sdf.org
      link
      fedilink
      arrow-up
      25
      ·
      edit-2
      11 months ago

      I get you want privacy, but there’s a line where it just stops making sense, and your personal info isn’t that valuable. Anyway

      Actually, you don’t need perfect privacy. You just need good enough privacy, and here’s why:

      If you’re a low-value target - i.e. a random internet user, that’s you and me - always remember that your value is low: Google, Microsoft, Amazon, Facebook… expend a certain amount of resources to fish for enough of your data to earn them a return on their investment. We’re low-value targets, so they first and foremost go for the low hanging fruits: the people who don’t know, don’t care, wallow in social media without any restraint and make it particularly easy to gather data from.

      All you have to do is make it hard enough and expensive enough for the corporate surveillance collective to lose money on you: create accounts full of fake data and don’t post personal information - or make up fake personal information in your posts - to poison their wells. Don’t post photos of you or your family. Use throwaway email addresses. Use a deGoogled phone. Don’t browse without an ad blocker set on reasonably high. Use a browser with anti-fingerprinting. Don’t fill out Costco membership cards. Pay with cash stuff that you don’t want anybody to know about. Etc etc.

      In other words, adopt a reasonable-enough privacy hygiene so that you’re not part of the low hanging fruits. It doesn’t have to be drastic, just good enough to make you not worth the sonsabitches’ time and effort.

      If you’re a high-value target however, a Snowden or an Assange, that’s a different proposition. But for the rest of us, private enough is good enough.