General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
Sasha S
Rob Braxman Tech
comments
Comments by "Sasha S" (@sashas3362) on "Rob Braxman Tech" channel.
Teslas are a drop in the bucket compared to all the surveillance cameras AND mics monitoring us in the form of other peoples phones (which we did NOT give consent to spy on us).
17
@robbraxmantech It has actually gotten to the point where simply existing (as a natural human) is now "illegal". You don't even have to do anything. Simply existing is illegal. At least within certain border lines. You know what I mean?
9
@notusedexer LOL! I'm actually very knowledgeable when it comes to the topic of physics and I know why you say that. I will agree that there is something wrong or missing in typical explanations of orbital mechanics. This makes it seem like orbits are not possible. I won't get into the details of all that because that is off topic. All I will say is that all you need to do is look at other planets and their moons or venus or mercury to see that orbits are indeed possible. Unless you believe that the luminaries in the night sky are all a holographic illusion created by TPTB for some reason. Regardless, even people who don't believe in satellites believe they are high altitude ballons. Starlink exists as does the satellites (or whatever they are) for satellite TV. Why else would you need to aim your satellite dish receiver at the points in the sky where the satellite (or whatever) is located?
5
Rob something strange is going on. I discovered there are no open source video editor apps for android. That just can't be. Not after all these years. Can it? Is this evidence of censorship?
5
@dertythegrower Satellite? Who can afford that? You mean starlink?
4
@dertythegrower Yeah, other options include free decentralized wifi hotspots and ISP's created using IoT which are not only effectively free but which also pay money to owners of devices for allowing their devices to forward/relay communications between sender and intended reciever. So, why are people still paying for centralized internet connections with decentralized options available?
3
@dorfsteen I'm not sure what you're saying. Are you saying you can't get a satellite phone to work out in the midwest. Sorry but I can't believe that. There is no reason why that would be. Even if satellites were fake you'd still be able to get so-called satellite service in the midwest the same as anywhere else. You understand that cell phones aren't satellite phones right? Sounds like you don't understand that and so think you should be able to get cell phone service anywhere because you think cell phones communicate directly with satellites. Let me make it clear and simple just to be sure. Cell phones don't communicate directly with satellites. When you make an international call overseas the call may be relayed through satellites but the call goes through the cell phone towers before it gets relayed through satellites (if it even goes through a satellite at all which it might not).
3
@dorfsteen Whether satellites are real or not, or whether calls are routed overseas via undersea cables, is irrelevant to how cell phones work. Cell phones are not claimed to work by connecting to satellites by anyone with basic knowledge of cell phone technology. It is no surprise you lose service in some areas. The maps you mentioned show the "dead spots". It's no secret there are dead spots. Those are areas where there aren't any cell phone towers nearby to provide the service. BTW iirc the reason we still use undersea cables is because they transmit light. They are optical cables. Light can carry more data at a higher speed than radio waves because the light is at a higher frequency than radio waves. They didn't have laser based communications when they laid those cables. Or maybe it was cheaper to lay undersea cables than to launch satellites into orbit. They certainly do have some sort of radio transmitters in the sky whether they be high altitude balloons or satellites in geostationary orbit. Otherwise your satellite tv dish wouldn't need to be pointed towards it. So if they can fake a satellite using balloons why would they lay cables under the sea? It would be easier to launch a high altitude balloon with a radio transmitter attached. You see the problem with your logic? I'll admit it is strange they haven't simply used lasers to communicate instead of laying fiber optic cables undersea. But like I said maybe it is cheaper to lay cables undersea. Satellites which transmit signals using lasers may require high power lasers too to get through all the particulates in the atmosphere. I know such satellites are now claimed to exist. They are being used to build a quantum internet where entangled photons are used for quantum encryption. This tech has probably been around longer than the public has known. But it is only within the past couple decades that I have heard of laser based communications. So it's relatively new in the public arena.
3
@thomasb3683 I don't trust samsung devices because samsung was reportedly caught spying on it's users a few years ago and is still reportedly spying on it's users. Who can you trust these days? Seems like nobody.
3
@readypetequalmers7360 The variation in the android devices due to differences in the proprietary OS's created from android have been said to actually enhance android security against hackers because then the hacker has a harder time knowing what OS they are or will be attacking. Of course the unpatched security holes you mention can be exploited by those who have a more privilieged access to your device such as the manufacturer, mobile phone service carrier/provider, and of course the gov (among others).
3
@robbraxmantech Well said about defending against the maniacs, Rob. The maniacs in gov are getting out of control now even in the "west". BTW I have heard the baseband is better protected these days. It used to be the baseband OS was completely separate from the android or iphone OS and rarely if ever had security holes patched. But due to some widespread malware which targetted the baseband they actually made at least part of the baseband OS part of the android or iphone "OS" so now the baseband can more easily get security updates. Of course, this won't stop hackers from targetting the baseband.
3
@robbraxmantech To be clear, I'm saying a genocide of the natural human race is underway. This is global. It has literally become illegal to breathe. That may be winding down due to some facts coming to light but the damage may already have been done. It may be too late for most. Perhaps all. Gov is a suicide cult, imo. I mean if they don't kill us with lethal injections it may be with nuclear war. According to EPA data, atmospheric radiation levels are already at extinction level and have been for years. It's claimed this is due to older nuclear reactors which are still active (thanks to gov mismanagement).
3
@machtschnell7452 Remaining human instead of becoming transhuman by submitting to the genetic modification they are mandating is rebelling against their control. Simply existing as nature designed us is being illegalized. There are signs outside businesses which effectively say "no humans allowed" (although that is not how they word it). Do you know what I mean? It doesn't matter whether you pay taxes or not. They are trying to force everyone to submit to transhumanisation. These mandates affected primarily most taxpayers. You see? They don't care about your money any longer. Money is now obsolete. Humans are obsolete.
3
You can install custom rom images without a PC by loading both a recovery tool app and the OS images onto an SD card and then entering the device recovery mode and then loading the recovery tool app and then flashing the OS image using the recovery tool app. Can't you install the ubuntu touch OS image without a PC the same way?
2
It's too late for most if not all, rob. Most everyone (if not everyone) was profiled before they became aware of the dangers. The only way we can defend ourselves now is to regroup by self-segregating into nations/states of like minded people instead of continuing to have people of all political, religious, etc beliefs trying to coexist together.
2
Powered by social MEDIA!
2
@notusedexer Listen, I understand where you are coming from. I too found it a bit strange how they say the thermosphere is like 10k degrees F or whatever but then try to say it's actually cold. But it turns out what they mean is the atoms in the low pressure of that layer of atmosphere are moving at a speed which is normally associated with 10k° F temperatures at standard pressure (1 atmosphere of pressure?). Because the pressure or density is so low fewer atoms strike the satellite and so very little energy (in the form of heat) is transferred to the metal. Or so it is claimed. I could point out some flaws in that logic but it seems to be true as proven by electrostatic inertial confinement fusion reactors. Look into that. It's a type of cold fusion using a plasma wherein the atoms are said to have a temperature of like 10k° F or whatever but the metal of the fusor doesn't melt. The plasma can't even boil water despite the fact the atoms are said to have such a high temp. They have a high speed associated with that temp but because the gas is at a low pressure the energy density of the plasma is low and so very small amounts of energy are transferred by it. Or so I believe. I need to fact check a few claims (such as the claim that the gas in the fusor is at low pressure) to be sure though.
2
@dorfsteen Who says there are satellites for cell phones? Whoever says that doesn't know what they are talking about. Cell phones connect to cell phone towers not satellites. A tower needs to be within range for your cell phone to work. There are very few towers in some areas such as the mountains and in remote locations there may be no towers. That is why your phone sometimes won't work. Cell phones can't communicate with satellites. So it's not because there are no satellites that your phone sometimes doesn't work. Your phone sometimes doesn't work because it is too far away from any towers. Understand?
2
@dorfsteen The phone doesn't connect directly to a satellite. It connects only to cell towers. Then the call may get relayed to a satellite by the phone company. But your phone is connected to the tower. From there is goes to the satellite. But your phone is connected to the tower. Understand?
2
@dorfsteen Im always willing to share my knowledge. I'm simply into technology. Was trained in electronics. It's my hobby to study that sort of info. It's not like I gathered all that from spending a lot of time fact checking flat earther claims.
2
@robbraxmantech I see what you are doing. You're not actually using google voice service but instead only using it to acquire a throwaway number so you can set up an email account? You're also NOT installing the google voice app so google voice can't capture your device ID or IP address? I'm guessing you are also hiding your IP address when setting up the google voice account via the signup webpage. Interesting. But do you know of a way to setup a phone so you can both make and receive calls without needing to worry about anybody obtaining your (real) phone number? Seems to me giving your phone number to anybody is risky these days and opening your phone to being hacked. It should be regarded as basic computer security to have an untraceable phone but unfortunately people view it as a threat as opposed to basic computer security. It seems authorities expect us to give up true security in exchange for their promise to protect us from the bad guys. Yet we are still getting hacked aren't we? I'd prefer to protect myself rather than rely on others to protect me.
2
Rob do you have a blog page where we can read your tips instead of watching vids?
2
What if "lying to the machine" becomes a crime?
2
@ProudlyINDIAN360 Good question (about how I protect myself from the radiation). It may interest you to know years ago a tech support rep remotely boosted the output power of a phone once (he told me he did that after I asked why the phone was burning me). I believe he did that to cause me harm because I yelled at him a few secomds before he boosted the power and there was no good reason for him to boost the power. It gave me a severe persistent headache although that may have been due to earwax. I went to the doctor about that headache and they removed a plug of earwax which may have been pushing against my eardrum. But I believe that was because the wax got liquified by the heat generated from the phone (which was getting extremely hot) and then hardened against my eardrum. But iirc I got the headache when the tech support rep told me he boosted the phone (while still talking to him). So beware. Anyway I probably should be taking measures to protect myself because the radiation is above safe levels. Thanks for reminding me of that.
2
@robbraxmantech Yes, one must always do their own research because the facts can vary from device to device and also part to part. Even if it seems to be the same it may have differences. There may be differences between the "generations" (such as "errata" or "erratum" lists published for each batch or generation of CPU!).
2
@mullergyula4174 Yeah it is beyond most.
2
@jasonsummers6705 I agree they are too slow for most people though. But many still use them. It is actually misleading for them to say they have shutdown the 2G networks because after they claimed to have shut them down I had a 4G phone and I noticed neither the 3G or 4G icons were showing when I dialed 611 for tech support from the phone service carrier. I inquired about that and after interrogating them thoroughly discovered that the phone was connecting to 611 via 2.5G or above (but below 3G). So when they say they shut down the 2G network they are being deceptive. The phones still connect to 2G networks. BTW it may interest you to know the tech support rep remotely boosted the output power of my phone too (he told me he did that after I asked why the phone was burning me). I believe they did that to cause me harm. It gave me a severe persistent headache although that may have been due to earwax. I went to the doctor about that headache and they removed a plug of earwax which may have been pushing against my eardrum. But I believe that was because the wax got liquified by the heat generated from the phone (which was getting extremely hot) and then hardened against my eardrum. So beware.
2
I suspect cell phones are able to send and receive signals through thick walls or even underground because they are actually transmitting partly through metallic nanoparticles dispersed into the environment (perhaps unintentionally) which act as an invisible antennae or cable.
2
The day is coming when most people will understand the threat posed by smart devices but it will be too late by then.
2
Rob google heavily censors search results according to this video: https://youtu.be/6FtPvDGrpkA It says millions or billions of results but only shows hundreds if even that. So startpage should not be used since it only shows what google shows.
1
I mentioned this to someone and he said any sort of automated crime detection is unconstitutional. He pointed to some cases involving automated speed traps set up on roadsides which take a picture if you go over the speed limit. He said a cop has to witness it, can't be a machine because that is unconstitutional. I don't know if that is correct but I do vaguely recall hearing something about how those speedtrap fines can be challenged in court and you will win because it is illegal/unconstitutional for some reason. I don't know why it is illegal. Maybe because it involves warrantless search before probable cause. The same may apply where client side scanning for criminal activity using phones are concerned. I personally don't have a problem with law enforcement using automated technologies to punish people for speeding or other traffic violations. Not enough is being done to ensure safety on the road imo. But use of automated violation detectors may be illegal. I'm inclined to say that if client side scanning protects kids then maybe it isn't so bad. But the gov tends to use kids as an excuse to take away rights and privacy. For example, I have discovered libraries are censoring online content using various filtering technology such as customized blacklists and also some "intelligent" ai based filtering of some sort. They admit that their filtering will result in some sites being unjustly blocked. They try to make it sound like that isn't a problem though because all you need to do is let the librarian know and they will unblock the site if it doesn't break their rules. That is intolerable imo because it is a violation of privacy. I shouldn't have to disclose to them what website I am trying to access. That is none of their beeswax. This lead me to discover that they aren't using secure DNS because they need to know the domain names to filter! I asked to see their privacy policy but they don't have one for using their computers or wifi hotspots. I tried to explain to them why that is a problem but they just didn't seem to understand. They kept saying things like "listen, we're NOT going to let people come in here and access illegal content". imo they shouldn't be policing people like that. Leave the policing to law enforcement. I mean if people come in there and start accessing illegal content then the police can arrest them. They are just using the excuse of protecting kids to spy and censor imo. It should be illegal for libraries to do that because that can lead to civil rights violations and abuses such as censoring perfectly legal content or a stalinesque purge of political enemies.
1
802.11n? Isn't that vulnerable to the KRACK exploit?
1
@robbraxmantech Was it? Last I heard some workarounds had been found for some of the fixes manufacturers implemented.
1
@robbraxmantech Do you know if the security standards established for/by 802.11w are now part of the basic 802.11 standard? Seems like they might be. I read they were part of 802.11ac and above so presumed they were not guaranteed to be implemented in a router with anything less. Although I have read that the "w" standards could be implemented by some manufacturers in older routers, there was no way to be sure of that unless it was certified as 802.11ac compliant.
1
Let's stop calling the spying google and others do "data harvesting" and start calling it what it is: SPYING. You see they get away with what would otherwise be illegal by playing word games and making excuses like "we're only trying to provide better service for you". Yet, what everyone really wants is privacy. How about they start delivering THAT?
1
It seems it is hard to find accurate reliable info about installing custom roms. I was lead to believe there were only a few hard to find devices which you could install custom roms on and that you would need to connect the device to a PC. It was only due to some very unlikely circumstances that I discovered the truth which is Project Treble allows you to install custom roms on most modern devices without a PC. Unless I am missing something, it seems all you need (aside from a couple apps which can easily be downloaded in addition to a code to unlock the bootloader) is an SD memory card. You store a recovery app and an OS of choice along with some essential files to the card and then boot into recovery mode, run the aforementioned recovery app on the SD card, install the OS and other files on the phone using that recovery app then you are done (as far as installing a custom rom goes). That is far easier than the instructions one usually finds. And as I said you can do that with most current phones. You only need a device with an unlockable bootloader. It seems most modern devices have unlockable bootloaders but there are a few exceptions. It seems the more expensive devices are the ones with locked bootloaders. The less expensive options are the ones which have unlockable bootloaders.
1
@robbraxmantech You should know. I wouldn't because I have not yet installed a custom rom. I'm just sharing what I read. I found a lot of websites which provide instructions for installing the most current official Android Open Source General System Image (AOSP GSI) onto ANY android phone which has android 8 (or is it 8.1) or above on it. They seem to be saying any phone can have a custom ROM installed on it if it either has an unlockable bootloader or is rooted. Some sources say you can do it without unlocking the bootloader and without rooting the phone but you need to use a PC to do it. To find these instructions just use the appropriate search terms such as "install AOSP GSI custom rom on phone without unlocking bootloader or rooting". Are you using an official AOSP GSI or are you using something else like lineage OS? Based on what I've read I get the impression the official AOSP GSI is more reliable than Lineage OS and many other custom roms so long as you follow the recommendations of the project treble checker whoch tells you what sort of AOSP build you will need (partition type etc). But maybe I'm wrong about that. I wouldn't know. I've never tried it. BTW while researching all this I found some webpage or video showing how to unbrick a bricked phone. Have you tried that yet?
1
@robbraxmantech Although it is probably true carrier-locked phones have locked bootloaders it seems to me many brands and models of carrier-unlocked phones have unlockable bootloaders although samsung does not. This has not always been true and seems to only have become true recently sometime within the past few years, I'm not sure when exactly). My understanding is a phone which does not have an unlockable bootloader can still be unlocked if it is rooted. But that is risky because then you are intentionally allowing someone (in the form of an app) to hack your phone and trusting them to hand over control of the device solely to you. There is some concern about the legality of rooting. It may be illegal to install a custom rom onto a phone which does not have an unlockable bootloader. In other words, if you have to root the device using a rooting app then it is probably illegal.
1
@robbraxmantech If by social media you mean the content on social media then, yes, it is true the info we share on social media is what POWERS social engineering. But the term social media usually means the platform (facebook, youtube, etc) not the content. IMO social media platforms are the weapon while the shared info (content) is the ammo.
1
@robbraxmantech Great video BTW. People need to wake up to the dangers before they end up like those raised in platos cave. Already this is happening. This is why you have people on the verge of civil war over who won the 2020 election. You have (at least) two competing groups each living in their own two very different realities because the members are being fed different information.
1
@robbraxmantech I wasn't trying to correct you. Just sharing my POV of the situation.
1
@dorfsteen Whatever.
1
@dorfsteen And you thought cell phones connect to satellites instead of cell towers? No offense. Just seems strange. I suppose it's possible though since cell phones are NOT electromechanical.
1
@dorfsteen Oh ok.
1
It's 2021 and I still can't get a linux phone at the local stores.
1
Rob, here is how the csam detector reportedly actually works: https://youtu.be/dAOanyCokL4
1
Rob do you know if it's legal to flash custom ROMs onto a tablet in the USA yet (replacing the original ROM)? I know congress made it legal for phones years ago but not tablets. But phones are basically small tablets so maybe it is legal to install custom ROMs in tablets after all? Websites say it's illegal though last time I checked.
1
@robbraxmantech I agree with that statement about ownership. I asked because I did hear some recent news about the passage of some new laws which might make it legal now such as what they call "right to repair" laws (or executive orders?). No custom ROM's for tablets? Really? You sure? I could swear I recall seeing some custom ROM's for some tablets. Lineage OS at least iirc. I'll need to check to be sure. That was a while ago. Possibly a few years ago.
1
@robbraxmantech My understanding is it's perfectly legal if the tablet manufacturer allows it and you truly own it. You may not truly own a device though. Especially if it's provided by some cell phone service provider. You must check the licenses for it. Some are subsidized making them more affordable but at the cost of never actually owning it so you forfeit the right to install custom roms unless it's allowed by the license.
1
@robbraxmantech Looks like you're right. Lineage OS does not have any roms for the tablets I thought I remembered seeing. At least not now. None of the android custom ROMs I was thinking of have any roms for tablets. So it's back to the drawing board for me.
1
I'm not sure I understand the strategy you are recommending or exactly what you are expecting to accomplish, rob. You talk about hiding your identity yet you talk about giving actual device phone numbers to google voice. Although you can use an unegistered prepaid phone bought with cash the carrier and it's affiliates will be able to identify the user because they have access to it's location via GPS and triangulation relative to wifi hotspots even if location tracking and wifi is disabled. Even if you never use the phone at home they can still identify you using facial recognition data etc when you are out in public. Not only that but they can locate your home by using the accelerometers and gyroscopes to track where the phone is even when it is turned off or the battery is removed because the baseband computer is always running (on a second non-removeable internal battery and can even be powered by airwaves like a crystal radio). BTW google voice records all calls for analysis by Ai to somehow improve google's speech recognition (or at least it still did last I heard about it). That data is reportedly anonymized but anonymized data can easily be deanonymized using data in databanks obtained through data harvesting. You might be able to hide from a certain Ai at this time but not all Ai's and certainly not forever. All the data is recorded and can later be linked to an identity someday after the Ai improves in it's ability to identify users. You might be able to hide phone numbers and identities from some people you interact with but not big tech or gov. Their all seeing eye has become impossible to hide from.
1
@robbraxmantech You mean email notifications? You're using a google voicemail number as the phone number required to set up an email account then having notifications sent to that email account? I still don't understand how that prevents the email platform owner or others (such as the Ai you mentioned) from learning your true identity since you are giving your phone number or device ID to google voice. Or did I misunderstand you about that? I'm presuming you are using the google voice app. If so then what prevents the app from acquiring your device ID and IP address? Or is there a web based version which can run in the tor browser or perhaps some web 3.0 browser or browser dapp? Web 3.0 holds some exciting promises for protecting privacy but most people are still using computers which come with closed-source OS's and apps to run the dapps...unless they've built the computer themselves and installed an open source distribution of linux instead of windows, etc. But even if you build from scratch you'd need to run some closed source drivers and BIOS/firmware code, wouldn't you? I know there are some open source BIOS/firmware/driver alternatives out there but am not sure that those are stable and reliable or not since they don't get bug tested the way the closed source options do (since few people are using fully open source systems because it is too challenging to build such a system). Somebody needs to mass market a fully open source computer which can be trusted. It's ironic how all the tools for building such a computer are available but you can't buy that kind of computer. It's as though it were some sort of sci-fi fantasy like antigravity or a time machine.
1
Rob, here is how we can get the google, apple, and microsoft spyware off our local store shelves: encourage your audience to go into their local smartphone and computer retailers and inform the employees there that they are accomplices to human rights violations and treason for selling the spyware. You see, spying on your own citizens (without just cause) is treason. Waging psyops against your fellow citizens is also treason. Helping enemy nations to spy on your fellow citizens is also treason. If they try to argue that they are just working there to pay the bills let them know that many nazis made similar arguments. Just obeying orders to pay the bills is not a valid excuse for committing treason. I'm sure I don't need to tell you what to say if they try to argue that people are free to buy privacy phones and that nobody forces us to use the spyware. The fact is we don't really have a choice. Ordering privacy phones through the mail compromises anonymity and makes you (and the phone) a target for surveillance. Only when privacy phones are the standard will we be safe. We need to end the stranglehold the spyware has on the market. To end it we simply need to let those spying on us that they are the criminals (not us) and are guilty of very serious crimes, and can expect to be prosecuted shortly. Not only that but we need to take these criminals to court. The hague court might be where we need to take these spies.
1
Rob what we need to do is start using non-local communication (AKA "quantum entanglement" or "coherence"). This involves zero (measurable) EMF and can be done with entangled "quantum nanodots". Those are nanoparticles which are entangled. It's often claimed you can't use entanglement to send signals but I don't believe that and iirc ways to use entanglement to send signals have been found. The main problem has been that we didn't have a proven method of connecting more than two devices via entanglement. But that problem has been solved and we now have the ability to interconnect all devices via entanglement. That is how they are building the "quantum internet" which means an internet secured by quantum encryption. Quantum encryption uses entanglement. We merely need to adapt that method of building a quantum internet to use entangled nanodots embedded into devices and used to transmit and receive signals. That should be easy. Then we'd simply need to find a way to find or create a source of entangled nanodots and transceiver circuits to use them for quantum communication. THAT is the hard part but shouldn't be too hard.
1
I'm now hearing you can disable this tech.
1
Rob look for a report titled "Time reversal findings may open doors to the future". This reveals a technique for sending a secure radio signal without knowing the location. I believe this applies holography to radio waves to make a signal which appears only at the intended recipient without knowing the location of the recipient. The signal effectively disappears everywhere else (or at least looks like background noise) making it impossible for anyone except the intened recipient to intercept the transmission. This can be used to avoid the need for location tracking with 5G (unlike the current beam forming tech which needs to know location to properly form or aim the beam). My understanding is some 5G implementations already use this method. I'll share a video about that later. This needs to become the standard in private communications (until non-local quantum encrypted communication becomes available).
1
@johnnyblade6088 Try telling that to the judge and see how it turns out.
1
@johnnyblade6088 I'm sure lying and deception are regarded as crimes because people can be harmed through lying and deception. The tech companies who are deceived by users who intentionally deceive can claim harm from such deception. For example, there are predictive systems which are used to predict financial data for investors. Money can be lost due to an inability to make accurate predictions when users feed the predictive systems deceptive info. You see?
1
I also recall reading that a SIM is a SoC somewhere like wikipedia. You can't believe everything you read online though, especially wikipedia. I also thought I once read a GPS system is now embedded into SIM's. I can't find that info anywhere now.
1
@mullergyula4174 Fractal antenaes can be compact. Besides that GPS only needs antennaes if it is using normal radio waves (AKA "far-field" waves) to communicate instead of quantum entanglenent or "near-field" waves. SIM cards use NFC iirc. This is not normal radio waves. Although it is commonly believed you need to be very close to a SIM card to communicate with them via NFC it is known that SIM's are trackable via drones and satellites. They may use quantum entanglement to communicate with the SIM. Such communication may be done via NFC. NF communication is NOT done via electromagnetic radio waves after all but rather something else (although related).
1
@mullergyula4174 GPS now uses quantum entanglement (to improve accuracy at least). This is a very obscure fact. I don't know anybody who is aware of that and I cannot cite the source where I read that. It has disappeared. It was reported in a news brief in a science or technology magazine though. Nuts & Volts or Scientific American or New Scientist perhaps. Maybe "Nature" magazine.
1
Rob seems to be saying the java code of a java card SIM is simply stored on the card not run on it but rather runs on a SoC outside the SIM card.
1
@robbraxmantech I wouldn't know. I don't mess around with them like you do. I only read about them on occasion.
1
@robbraxmantech Like I said (perhaps in another thread here), a few years ago I read much of the baseband code and functions have been moved to the android or iphone OS to make it more secure. Seems like maybe you are confirming that here.
1
@robbraxmantech I'm wondering if maybe part of the reason 2G and 3G networks are being shutdown is to force people to upgrade to more secure phones with the newer "SIM cards" (meaning the removeable card, whatever it is called these days) which may be more secure because they may not have all the same (reprogrammable) computing capabilities as older SIM cards.
1
@jasonsummers6705 People still use 3G and possibly 2G (2.xG that is not 2.0G). It is not as slow as you may remember it being because those networks are not anywhere near as congested as they used to be now that most people have migrated to the 4G and 5G networks.
1
@jasonsummers6705 That may be all it does but I believe it is capable of doing more, presuming you mean the whole physical card and not merely the SIM app. The whole card contains a complete universal turing computer. It may not be programmed to do much as it comes but can be programmed to do anything (within reasonable limits). IMO it should be programmed to scan and defend against malware and other attacks because it is best to have a 2nd computer do that.
1
Lets's take google, apple, microsoft, and all the other spies, censors, and psyop agencies (and anyone aiding them including retailers) to the UN's International Criminal Court where they will meet the same fate as many nazis for their TREASONOUS crimes against humanity. Who is with me?
1
Taliban can use the profiles created by all the spyware to identify christians and other targets for termination. Gov warned you of terrorist attacks. How long before your gov is overthrown and you are being hunted? Perhaps it's already happening.
1
Rob, all the surveillance going on should have people very frightened in light of what is going on with the taliban taking over afghanistan. Taliban is executing anyone known to be a christian, etc. You don't think they will use profiles created through data harvesting to identify christians? The same could happen in the USA. The USA already told people to prepare for terrorist attacks. Now they are importing "refugees" from afghanistan. Understand? We should be preparing for the takeover of the USA by taliban. Perhaps it has already happened to an extent. I certainly feel as though I am no longer living in the same nation I grew up in. I feel as though the nation has been taken over by hostile forces. Meanwhile I have been trying to buy a computer I can trust to get through this lockdown and have been awakened to the fact that there are no computers we can trust. All spy on us supposedly to protect us but this poses a very serious threat to many if the gov which protects us is overthrown by china, the taliban, etc. There are clues which lead me to conclude that is exactly what has happened. People need to wakeup to what is going on and point out to the gov that the surveillance doesn't actually protect us but rather poses a greater danger than protecting our privacy so should be considered treason.
1
Isn't there still some closed source OEM code running at a level below the OS in the baseband or firmware? Couldn't spying be done at that level? My understanding is project treble compliant phones have the OS and Hardware Abstraction Layer (HAL) separated. I'm guessing the HAL is where the OEM closed source code is found. Or am I wrong? Perhaps the different lineage OS builds for the different devices include open source alternatives for the HAL so that you are replacing all the manufacturer installed code with open source alternatives instead of leaving some closed source code from the manufacturer in the device. Or are the different lineage OS builds "customized" in some other way?
1
@robbraxmantech Thanks for letting me know, Rob. I appreciate your input. Is there a way to replace the OEM software and drivers with open source alternatives? It seems there should be some open source alternatives out there by now. There are open source BIOS, firmware, and driver code for PC's and some peripherals so why not phones? BTW do you know what the legal status of installing custom roms onto tablets is? It seems it was illegal at one time and so may still be illegal unless it was legalized. I have read it's legal to install custom roms onto phones as long as you truly own it and it is allowed by the legal documents attached to the phone and you aren't intending to do anything illegal with it. But I have read it is illegal to install a custom rom onto tablets. I don't understand why there would be a difference between a tablet and a phone. A so-called (smart) "phone" isn't actually (only) a telephone but rather a small tablet. A tablet can make "telephone" calls AKA "voice calls" the same as a tablet so what is the difference? A tablet can do everything a phone can do or vice verse. So what is the difference? Supposedly it's illegal to install a custom rom onto a tablet due to copyright laws but I don't understand that. Perhaps you would know. Hopefully that nonsense has been outdated. Maybe the right to repair executive order biden signed the other day makes it legal to install custom roms on tablets? The only reason that law was needed is to knock down the obstacles created by copyright laws on the software inside of the hardware, right? So, if copyright laws are what made it illegal to install custom roms onto tablets and you argue you are "repairing" a tablet by installing a custom rom because you believe it is in need of improvements due to (intentional) design "flaws" (which are intended to weaken security and create backdoors for illegal surveillance) then it should now be perfectly legal to install a custom ROM onto any tablet you own to "fix" it (IMO).
1
@robbraxmantech IMO blockhain phones are the way to go. What do you think about blockchain phones running dapps instead of apps? Why aren't these more popular? Seems more secure to me partly because you don't need to download the app or install it. It runs remotely. It's like using a "dumny terminal" to remotely control some supercomputer. Quantum computing tech is evolving so fast I can't keep up. But I know it is now possible to remotely control quantum computers now. You can actually do all your computing on quantum computers now. But you are accessing and controlling them with classical computers. But that connection and the conttolling classical computer can be secured in new and improved ways via quantum computers if I remember correctly. So why isn't this the standard yet?
1
@robbraxmantech While searching for an open source HAL and drivers I seem to have discovered that a HAL is only required if you are installing android. This seems to imply the closed source OEM layer can be replaced with open source alternatives if you install a true linux OS instead of android which is not true linux (android is only regarded as linux because it contains a linux kernel). Android is java based VM's running on a linux kernel. Years ago the DoD issued a warning to the public that java (the programming language as opposed to javascript if I understand correctly) had some vulnerabilities and should not be used. Do you know if that warning still applies? Or have the vulnerabilities been fixed somehow? Anyway, the point is I'd rather install a true linux OS onto a "phone" (or phablet) because not only would that be more powerful but it could be fully open source even at the driver level. Or am I missing something?
1
@robbraxmantech BTW the reason rooting using a rooting app is risky is because (as with all open source code) even with an open source rooting app there is no guarantee the code has been thoroughly audited by the community; even if it had been thoroughly audited and a problem found there is no guarantee the public would be informed of that problem because the person(s) who discovered it might keep it to themselves to exploit somehow or might not be able to get the message out due to censorship. It is also possible the rooting app could have malicious code injected into it while being downloaded. So rooting apps are risky. Installing custom roms is also risky because if there is any malware/spyware on the system used to download the custom rom images it can then infect the OS at the root level instead of at a higher level so can be more devastating. So you want to be sure you use very clean and secure computers to prepare and install custom rom files (meaning a computer with only the bare essentials installed and which hasn't been used to surf the net haphazardly; ideally you want to use a new computer or a computer with a freshest reinstall of the OS). I'm sure I don't need to explain any of this to you though, rob. Just sharing for the benefit of others who may be reading.
1
Did I miss the part where you show how to install the AOSP custom ROM on the device or how to customize/configure it for the device?
1