Holes in 4G and 5G networks could let hackers track your location

Discussion in 'Wall St. News' started by dealmaker, Feb 27, 2019.

  1. JSOP

    JSOP

    Or get a temporary phone/sim cards off those stands Jason Bourne style. But now even those temp. phones/sim cards, you have to provide ID's so you would have to provide fake ID's. Damn it!! The government always makes me become a criminal!! There is just no way around creating fake ID's.
     
    #11     Feb 28, 2019
  2. JSOP

    JSOP

    So people can still track you even though you tell them "Do Not Track"? Just like you never check off the box to subscribe to their newsletters and mailing lists but they still sign you up anyway for you to get their junk? But at least for those, you can unsubscribe the 2nd time, is there any definite "Do Not Track" mechanism that if you really sign up, you will REALLY not be tracked?
     
    #12     Feb 28, 2019
  3. Turveyd

    Turveyd

    Hide in plain sight, that's the solution, make it appear that there is nothing to see / find then they'll never have a need to track you!!
     
    #13     Feb 28, 2019
  4. Simples

    Simples

    If you connect to internet, you are broadcasting all your traffic from origin of your end-point. Often, this is connected to a household within a given time period of end-point lease. All corporations cooperate with states and others, in white, grey and black manner. So no. You'd need to use Freenet, I2P, Tor, etc., but even then your browser would need to be secured against offering information that can be tracked (ie. session variables, javascript, cookies). Marketing is even more insidious than most hackers in this regard!

    If you try to hide your signature though, that's even more reason to track you for certain agencies. Whole industries have boomed for past 20 years, offering to sell all your data to all governments and corporations. Also, lots of data are published anonymously for free from security breaches worldwide. Any password you stored before ie. 2000, may be regarded as public domain now. Yes this is published together with your full account id, and should be checked online (though be careful revealing passwords!).

    The flip side is, we can't really allow free agency of just any violent or destructive ideology either. With more tech, there needs to be some balance.
     
    Last edited: Feb 28, 2019
    #14     Feb 28, 2019
  5. JSOP

    JSOP

    Well the biggest problem is we give up all of our privacy, become open targets for marketing and hackers alike and they still don't catch the "violent and destructive ideology" or dangerous criminals so we made all of the sacrifices for nothing because the real "violent and destructive ideologies" and the criminals would have invested the time and energy and the resources to actually protect their identity and erase their trails since they have every incentive to do so. I mean do those proxy sites like freenet, tor, i2p or those VPN really distinguish between their clients to decide who they sell their services to? Anybody who wants to use/buy their services, they will gladly provide indiscriminately.
     
    #15     Feb 28, 2019
  6. I think that no logs policy is nowadays compromised by many services. I prefer Avast https://cooltechzone.com/avast-free-vpn as it's the most useable service for streaming (different levels of speed availiable).
     
    #16     Jul 2, 2019