Learn.Abovephone.com Webinar: How to tell if your phone is hacked.

in #lifeyesterday

Just a quick promotion of a webinar that aims to teach people how to tell if Pegasus or similar software has been infiltrated onto their device. I just don't use my phone for anything but text and phone calls. I don't take my phone out of the home. This makes my device almost irrelevant to spooks, doesn't leave any data trail across the web, and costs less because I can use the lowest quality, and cost, device available on the market. But that's probably not how you secure your devices from creepy stalkers that want to copyright the dick pics they stole off your device and add them to their massive, personal hoard of >16M dick pics they have at home for their viewing pleasure.

NSAYourPicsOurCopyright.png
IMG source - AmericasBestPics.com - Notice at the bottom it calls the dick pics 'government property' and explain to me how you are considered a free man if your private stuff is government property. Also, your dick pics they stole off your device are classified materials. Your dick is a threat to national security and you can put that on your Tinder bio

Whatever uses you put your device to increase the attack surface you present to the world. The more you rely on your phone, the more devastated you will be when hackers gain control of it, it's bricked, stolen, or otherwise used by malevolent parties to do you harm. Take Back Our Tech is a movement, as well as a company that wants to help you help yourself, and that's what the Webinar referred to in the title of the OP is intended to do. TBOT wants to teach you how to tell if your phone has been infiltrated by malware that could present all kinds of risks (besides stealing your dick pics), or if there's just some update, or a bug. The link above is <2 minutes of video explaining, and you should take the time to hear them out.

I hope ya'll that put your phones in harms way take the time to tell when they've been harmed, so you don't get hurt more than necessary when they come for you.

Sort:  

I bet he has your dickpics

I bet he doesn't, because none exist. I don't use my phone to interact on the internet. I don't even take it out of the house. My computer doesn't have a camera, nor a microphone. I take these measures to combat the surveillance and vulnerabilities I have been subjected to when my out of the box economic endeavors were targeted decades ago, and so far such brutal and simple mechanisms as not having online bank accounts to hack at all have proved 100% effective at preventing my online bank accounts, as well as nonexistent dick pics, from being hacked.

Thanks!

Okay faggot
Go abolish flags and then steal people's phones cuz you have none urself, then tell the people that you fucking faggot commie want to save them XD by forcing your faggot ideas what one should or not do unto them

Just take care to not get shot in Murrica XD

I have offered rational arguments for you to address, and you have demonstrated incapacity to interact other than via ad hominems. Please leave me be hereafter.

Just a quick promotion of a webinar that aims to teach people how to tell if Pegasus or similar software has been infiltrated onto their device. I just don't use my phone for anything but text and phone calls. I don't take my phone out of the home. This makes my device almost irrelevant to spooks, doesn't leave any data trail across the web, and costs less because I can use the lowest quality, and cost, device available on the market. But that's probably not how you secure your devices from creepy stalkers that want to copyright the dick pics they stole off your device and add them to their massive, personal hoard of >16M dick pics they have at home for their viewing pleasure.

Dear @valued-customer !
Thank you for kind advice!

You are very welcome. It is my hope in all my endeavors to increase understanding and freedom that brings to as many as I can.

Thanks!

very interesting and concerning, the tech is a double-edge' sword

It is weaponized to be used against us who adopt communications technology, and TBOT is dedicated to helping people understand what they can do to be able to use available technology and prevent being abused by creepy stalkers when they do. I hope I can help people to learn how to be safe from those terrible criminals, and that is why I posted this information.

Thanks!

If having a phone is a must and security is important, remove cameras or block them off with tape or something. Remove microphones. Root and remove bloatware, all Google apps and services, don't use chrome, Firefox, use instead brave or run kali Linux with VPN and or tor, of course the professional hackers might have some extra stuff. But other than that, just simply stay away from using a phone.
Otherwise, to contact others,
Use mail service instead, use wax seals with your unique insignia, use encrypted envelopes, wear gloves, drop mail in public boxes out of town.

Bonus: Use their address for the return address and don't use stamps.

"...remove cameras or block them off with tape or something. Remove microphones. Root and remove bloatware..."

I do all of these, and I also don't use phones for any online activities, making the very complex defenses necessary to do so unnecessary to me. I don't take phones outside the house, making the tracking they enable useless. I have been stranded by breakdowns and had to walk miles to reach services as a result, but no security is perfect, and a stroll in the woods is hardly the tortures of the damned.

But when people use smartphones for those thing, TBOT provides means of securing folks using smartphones from the hazards of creepy stalkers that we all know are trying to track and surveil us, and I hope this can help people secure their communications.

Thanks!