Understanding the Different Phone Tracking Threats

Streamed on:
7.41K

The phone is made of two CPU's: the Application processor and the modem processor. And each has separate threats. Just a quick review so you know separate the Big tech tracking, PSTN, Stingray, CALEA etc and know how to quickly deal with each.

-----------------------------------
BraX2 Privacy Phone is now available on https://brax.me. Sign in to the platform to see the store.
-----------------------------------
Merch Store
https://my-store-c37a50.creator-spring.com/
-----------------------------------

I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Support this channel on Patreon! https://www.patreon.com/user?u=17858353

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

https://brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise

https://bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing

https://whatthezuck.net Cybersecurity Reference

https://brax.me Privacy Focused Social Media - Open Source

Please follow me on
Odysee
https://odysee.com/$/invite/@RobBraxmanTech:6
Rumble
https://rumble.com/c/robbraxman

Loading 14 comments...