this post was submitted on 27 Oct 2023
55 points (84.8% liked)

Privacy

31833 readers
80 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] TCB13@lemmy.world 53 points 1 year ago (2 children)

So let me get this, phone was wiped and a new SIM installed. That article is a piece of garbage. Phones have a IMEI that won't change, so when she puts the new SIM card it will be identified as the same phone. We also know that Google - let alone authorities - was ways and deals to get IMEIs from Android phones and carriers so... so much for taking a phone off the grid.

[–] jet@hackertalks.com 20 points 1 year ago* (last edited 1 year ago)

It's not a great guide, but it's a decent article. The journalist doesn't understand enough to give advice, but to tell their story. Their adversary was identifying them by phone number, they got a new number and that worked for them. So it worked for their threat model.

They just don't realize there is so much more to the story.

[–] BrikoX@lemmy.zip 4 points 1 year ago

One key part you missed was that she got used phone, so the IMEI is not tied to her identity. It's far from perfect execution, but for the stated goal of not being able to be identified by the phone number, it's adequate.