For many years I have used both Windows and Mac products for computing. I have a laptop and numerous desktops that I use for work, leisure, mining, etc. Please don’t judge me for using a Mac. I’m technology agnostic and use the device that best suits my needs; not because I’m a fanboy. Recently I have been looking around for a new laptop. I would like to find a device that is more secure but beautiful and practical. Here are my requirements:
Works with Windows and Linux.
Looks and feels good.
Medium in size. Not too big and not too small.
Durable and flexible so that I can depend on it working for many years.
While I was doing my morning research I stumbled upon the video below. I haven’t bought one yet but I’m pretty excited to order one. This video was a pleasure to watch because this is how I look when I get a new toy in the mail. Especially one that is really well built and has been lovingly and thoughtfully designed.
Now you may be wondering why I have this here as this website is about secure phones. Well, I get asked a lot of questions about tech. Sometimes people would like to know about security for other devices. One thing that privacy-minded people are looking for in a laptop is a way to disable the camera. This laptop includes a camera shutter and a microphone hardware shutoff switch! Seriously, I don’t know any other manufacturer with these features. If you are really paranoid you can go one step further and remove the camera and microphone.
I am not a paid sponsor for Framework and I have yet to purchase their device. However, this seemed like a very interesting opportunity for those that love technology and are concerned about privacy.
This morning I was doing my morning research. There is so much going on right now that it is hard to understate how historically significant this period in time will become. So patriots keep your eyes open and use your wisdom to discern what is true and what is not. I stubbled upon a great video this morning from TheKwakBrothers called The Great Reset and I think there is more here than meets the eye (see video below) .
If you don’t know what the Great Reset is the video provides a good summation, but in short it goes something like this:
Cause or use a major crisis.
Government steps in to solve the problem and takes more control.
Eventually the government controls everything and people are happy.
This is the fairly tale of mass psychosis (see video below) that is used to bring about The Great Reset. Now here is where I believe these two videos and phones come together. If you have followed me thus far then you are doing well. I’m keeping this brief but I hope you can see where I am going through the use of these vidoes and making some logical connections. The way that the government is determining if these actions are having the intended affect is through monitoring our phones. Really think about this.
In my professional career I have built many websites. The way that we determine the effectiveness of the website and digital marketing is through website monitoring. Often Google Analytics is used for monitoring and it will tell us how many people came to the website, how long they stayed, what pages they visited, whether they made a purchase, and so on. With this data we can then determine if the investment is providing a return. In order to determine whether these investments are paying off they are using our phones to influence and monitor.
One last take away from these videos. Individually they are single pieces of information. However, when I put them together I see the following:
Convince the public that something is a human right that wasn’t previously (health care or housing).
Create a crisis around that human right.
Use propaganda to convince the public of the human right during the crisis to create an emotional tie.
Monitor the result of campaign through big tech such as social media, phones, and other technology.
Rinse and repeat until The Great Reset has been completed.
I could be totally off base here. Only God knows the true course of events and, if you read the end of the book, we all know how this will end. Hopefully, this will provide some information to help us make sense of this crazy time. I pray that we are like the men of Issachar, “who understood the times and knew what Israel (or whatever country you are in) should do.”
How do you know when your camera or microphone are active? Many phones will show an LED indicator when the camera or microphone are active. Call me paranoid but I don’t trust that the camera or microphone couldn’t be activated without notification. If you see a person with tape covering the camera of their phone then they might be a fellow security minded patriot.
Instead of putting tape on your phone there is another solution. I use an application called Vigilante to monitor and notify me if the camera, microphone, or location tracking is turned on. Now I can have some peace of mind knowing that if an application tries to activate one of these features I will know. If you still don’t feel comfortable without the tape then keep rockin’ it. Although, I would suggest some different color tape to make it look interesting.
You can find Vigilante on the F-Droid app. If you are unfamiliar with F-Droid it is the Open Source equivalent of the Google Play Store. F-Droid is installed on all Patriot Phones to provide an interface for finding and installing applications. Direct link to Vigilante on F-Droid.
Once the application is installed then it will start working. You don’t need to do anything special with the configuration unless you want to play around. Try opening your camera after installation; if you see a notification on your screen then you know it is working correctly. Just like any security solution this is just part of the total package. When combined with a secure operating system and other security apps it creates a solution that is more than the sum of their parts.
Text messages also referred to as SMS/MMS messages are sent unsecured across the phone companies network. These messages are not encrypted and stored by the phone company for future use. For example, a lawyer can request a copy of text messages from a specific phone(s) if it relates to a lawsuit. I have always assumed that the US government could have access to these texts as well if related to a case. In the back of my mind, I always assumed that this access could be expanded for other uses by the government.
This recent article shows that there are those in government that want to use this data and access it for their own purposes. It’s concerning that so few people are talking about privacy and government overreach. It’s also concerning that so few people are willing to take small steps to protect their data. Recently, I wrote an article on Signal. When both parties are using this app their text messages are encrypted from one phone to the other phone (end to end encryption). It’s a simple solution to protecting text messages that we all should use. If you would like more information on Signal, check out my article on it.