Just occurred to me that in phones with the latest processors, proximity sensors can be used for recording data and, perhaps, even replace the camera for a more comprehensive method of imaging.
Ray, Apple is putting out a phone without a SIM card and many of them can take a virtual SIM as well. So they have probably already raised their game.
With three granddaughters, I've given up on considering it anything but surveillance!
As usual, you are right about most everything.
And Apple screwed up my perfectly good system by not letting you re-locate the "home" to external to the desktop, just links now, under the latest software release.
I didn't think they would screw that up under Monterey 12.6 but as usual they proved me wrong.
I think the thinking on a "secure" operating system is that it is a pipe dream. As well as pointless.
You want secure, try smoke signals with morse code.
GMRS with coded phrases. "The chair is against the wall."
"They" own anything in the electromagnetic spectrum.
Hey, I still believe in the existence of nuclear weapons, the moon landings, viruses, prions, and that pigeons make the best secure comms, but hey, nobody is perfect!
Radio Free America Announcer: "It’s 11:59 on Radio Free America; this is Uncle Sam, with music, and the truth until dawn. Right now I’ve got a few words for some of our brothers and sisters in the occupied zone: “The chair is against the wall, the chair is against the wall“, “John has a long mustache, John has a long mustache”. It’s twelve o’clock, American, another day closer to victory. And for all of you out there, on, or behind the line, this is your song."
Thank you for the corrections. Not sure how to implement it, but at least I am pinning your post so that it would be on the top.
I still believe, it's data collection for the global simulation and there is no need for total surveillance; the data can be exploited as needed. Once the globalist can openly kill, which they already can, there is no need for mass surveillance. The tech is the same, but it is used at a higher level. No doubt, the central AI can spit out potential cores or resistance, besides advising the technocrats about the next step towards the NWO.
When it comes to a tech co "screwing up," I can't help remembering the saying, "it's not a bug; it's a feature." Sorry, too much time spent with computers since 1988. :)
Please, notice that as long as your computer is ever hooked up to the web, it accomplishes the same (this is a good reason for having at least two computers). MS Windows itself is spyware, but Google, Gmail, Fakebook, and the like all do their own data collection, if they are running on a computer that has at least an internal speaker and an internet connection.
Landlines are also recorded by the NSA, and most of them can probably listen in, even when the phone is not used.
As far as I know, what works is using a "darkness container" that blocks all transmission. Such a container is very easy to make for about $2 for a padded envelop and aluminum foil. I got instructions online. Or you can buy one at a much higher price. But no work is involved. How to check? Put your phone inside. If it doesn't ring when you call it, the block is effective.
Even if it's off, it can still record sound? I suppose so. By record, you mean RECORD, because when transmission is blocked, it cannot send what it records. It would need to transmit when transmission is enabled (when the darkness bag (Faraday cage) is opened. Is that how it works?
Just occurred to me that in phones with the latest processors, proximity sensors can be used for recording data and, perhaps, even replace the camera for a more comprehensive method of imaging.
If anyone knows more about this, please, post it!
Ray, Apple is putting out a phone without a SIM card and many of them can take a virtual SIM as well. So they have probably already raised their game.
With three granddaughters, I've given up on considering it anything but surveillance!
As usual, you are right about most everything.
And Apple screwed up my perfectly good system by not letting you re-locate the "home" to external to the desktop, just links now, under the latest software release.
I didn't think they would screw that up under Monterey 12.6 but as usual they proved me wrong.
Edwin, what's the thinking on GrapheneOS, yes or no?
The following new site on Substack belongs to a friend and it's fantastic:
https://outraged.substack.com/p/what-is-covid-damp-squib-or-what
I think the thinking on a "secure" operating system is that it is a pipe dream. As well as pointless.
You want secure, try smoke signals with morse code.
GMRS with coded phrases. "The chair is against the wall."
"They" own anything in the electromagnetic spectrum.
Hey, I still believe in the existence of nuclear weapons, the moon landings, viruses, prions, and that pigeons make the best secure comms, but hey, nobody is perfect!
.-..-. - .... . / -.-. .... .- .. .-. / .. ... / .- --. .- .. -. ... - / - .... . / .-- .- .-.. .-.. .-..-.
.-..-. - .... . / -.-. .... .- .. .-. / .. ... / .- --. .- .. -. ... - / - .... . / .-- .- .-.. .-.. .-..-.
Whose chair? What chair? Please, elaborate! :)
Radio Free America Announcer: "It’s 11:59 on Radio Free America; this is Uncle Sam, with music, and the truth until dawn. Right now I’ve got a few words for some of our brothers and sisters in the occupied zone: “The chair is against the wall, the chair is against the wall“, “John has a long mustache, John has a long mustache”. It’s twelve o’clock, American, another day closer to victory. And for all of you out there, on, or behind the line, this is your song."
Is that from a movie I kind of remember? Well, that was called Good Morning, Vietnam. Close enough! :)
Unfortunately with the zips already in the wire, our situation is a little more dire than theirs was.
But we are another day closer to victory.
Thank you for the corrections. Not sure how to implement it, but at least I am pinning your post so that it would be on the top.
I still believe, it's data collection for the global simulation and there is no need for total surveillance; the data can be exploited as needed. Once the globalist can openly kill, which they already can, there is no need for mass surveillance. The tech is the same, but it is used at a higher level. No doubt, the central AI can spit out potential cores or resistance, besides advising the technocrats about the next step towards the NWO.
When it comes to a tech co "screwing up," I can't help remembering the saying, "it's not a bug; it's a feature." Sorry, too much time spent with computers since 1988. :)
Confirms my determination to never give up my landline and never use these infernal mobile devices!
Please, notice that as long as your computer is ever hooked up to the web, it accomplishes the same (this is a good reason for having at least two computers). MS Windows itself is spyware, but Google, Gmail, Fakebook, and the like all do their own data collection, if they are running on a computer that has at least an internal speaker and an internet connection.
Landlines are also recorded by the NSA, and most of them can probably listen in, even when the phone is not used.
As far as I know, what works is using a "darkness container" that blocks all transmission. Such a container is very easy to make for about $2 for a padded envelop and aluminum foil. I got instructions online. Or you can buy one at a much higher price. But no work is involved. How to check? Put your phone inside. If it doesn't ring when you call it, the block is effective.
Yes, a Faraday cage is effective, but the phone can still record sound.
Even if it's off, it can still record sound? I suppose so. By record, you mean RECORD, because when transmission is blocked, it cannot send what it records. It would need to transmit when transmission is enabled (when the darkness bag (Faraday cage) is opened. Is that how it works?
Yes.
Do you have any information on this?
Nope; it's only logical, based on the existing technologies and the known objectives of the data collection.
Interesting idea about the fight for ultimate power!
Published it a number of times, especially in comments, but here is one of my articles mentioning it:
https://rayhorvaththesource.substack.com/p/how-can-the-technocrats-fail-is-it
Now that was a terrific thought provoking article!
Mostly, the only way to figure things out is conjecturing by exclusion... The data are never sufficient.