Post A4Bq6vLitVEhefqk2S by error@spinster.xyz
 (DIR) More posts by error@spinster.xyz
 (DIR) Post #A3d1st6vSIRUMD6Kmm by Icarus_girl96@spinster.xyz
       2021-01-26T11:41:01.541267Z
       
       0 likes, 1 repeats
       
       Hi everyone, I’m wondering what I can do to help fight for our rights and further our movement? Do you have any recommendations? I feel so angry but also so helpless, you know? I was thinking of sending letters to newspapers but that seems to be all I can come up with really - and I don’t even know how to go about doing that!I’m an illustrator and have been writing a book but that takes a long time. I’ve been sharing articles with my mum and my friends (my mum agrees 100%, have to be careful with my friends - they’re very clever and capable of critical thought but likely don’t want to be branded a “transphobe” or a “bigot” ) even my brother agrees with us completely. I just don’t know what to do or how to make a difference - advice is very very welcome!
       
 (DIR) Post #A3d1stZdjXPXnGXGXg by SphinxSister@spinster.xyz
       2021-01-26T11:44:03.497898Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 Can you share your art online or maybe work with somebody who already writes/ has a platform and could use some art to compliment their writing? Which country are you from?
       
 (DIR) Post #A3d1stwgLrqIwjJfSS by Icarus_girl96@spinster.xyz
       2021-01-26T11:50:20.151118Z
       
       1 likes, 0 repeats
       
       @SphinxSister I’m in the UK, I’m not very good at computers tbh, I don’t have any social media - embarrassingly only got email when I turned 20. I’m hoping to get my book published but it’s only anti TRA in the sense it focuses entirely on real women and excludes trans “women”. I feel quite incompetent and extremely hopeless :S My book is a collection of statistics proving that we need feminism in the western world (an uncomfortably high number of men disagree with that)
       
 (DIR) Post #A3d9eyDmSORjmpBLbU by SphinxSister@spinster.xyz
       2021-01-26T11:56:19.516105Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 I asked re. country to think of which organisation you can help. @RepealTheGRA might have some ideas. Re. computers you'd online need to scan and upload it. Let who ever manages the page do the rest. Don't give up re. the book.  More women's voices are needed and welcome.
       
 (DIR) Post #A3d9eyf4ouHT9Tx99M by Icarus_girl96@spinster.xyz
       2021-01-26T12:02:31.654326Z
       
       0 likes, 0 repeats
       
       @SphinxSister @RepealTheGRA Thankyou very much :) It’s really horrible seeing a great injustice happen and having no idea what to do.
       
 (DIR) Post #A3d9ez27REiEIwjY48 by SphinxSister@spinster.xyz
       2021-01-26T12:05:16.492715Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 @RepealTheGRA I know.I am in the same boat as I am immunocompromised and stuck here for the foreseeable future. It is really frustrating not being able to do more.
       
 (DIR) Post #A3d9ezPA3Z8zSPVwyu by Icarus_girl96@spinster.xyz
       2021-01-26T12:13:13.882747Z
       
       1 likes, 0 repeats
       
       @SphinxSister @RepealTheGRA Aww, I’m so sorry to hear that! This past year must have been hell for you :(  I’m kinda stuck too - I live in supported housing and am not the most mentally or physically stable person - people hating and threatening me is something I’m terrified of but keeping quiet about TRA and their attack on women can’t be an option.I wonder how many people have their doubts about transgenderism but keep quiet?
       
 (DIR) Post #A3d9ezrANRXsrGcJdI by SphinxSister@spinster.xyz
       2021-01-26T12:28:58.087848Z
       
       1 likes, 0 repeats
       
       @Icarus_girl96 2020 was tough but I was coping. Since 2021 started I've 1) been told I cannot take the vaccine ( I do not drive so that means being stuck in a tiny village with a few 100s of people) 2) two friends died of Covid and 3) argued irrevocably with another friend.I have read some of what you shared and I am sorry about all that you have been through. You write very well and I think that helps this cause. Re. quiet, a lot of people from what I have seen locally. Fear is a great silencer, and so is greed.
       
 (DIR) Post #A3d9f0HOnuWsActGWO by Icarus_girl96@spinster.xyz
       2021-01-26T13:08:42.704690Z
       
       1 likes, 0 repeats
       
       @SphinxSister I’m so, so sorry to hear that, the isolation must be unbearable - I’m so sorry you’ve lost two friends to covid too, that’s heartbreaking 💚Aw, don’t be sorry, it’s made me who I am and maybe even made me a better person. I think a lot of people think they have to be unquestionably liberal - for a while I struggled with the fact I didn’t believe in transgenderism; I’m not sexist/racist/homophobic/ablest/ageist so how can I be “transphobic”?  But what is transphobic? I don’t wish harm onto anyone, I don’t want to hurt anyone, I just can’t mindlessly deny logic and buy into a harmful delusion.I think most people agree with us but either are in denial or are too cowardly to speak up.
       
 (DIR) Post #A3eWRWg22ygehMuljU by Butterfly_tsuji@spinster.xyz
       2021-01-26T13:23:49.336632Z
       
       1 likes, 0 repeats
       
       @Icarus_girl96 @SphinxSister As someone who spends a lot of time online, maybe to much I can answer questions about social media if you have any xD. I think making a radical feminist/gender critical/activist whatever you wish to call it Instagram could be a good idea o3o. I have actually been thinking about this myself. I recommend doing it on Instagram, I haven't seem them terminate radfem content on the trans issue as ferociously as the other social media platforms.I would use a different e-mail and separate it from your other art projects though for your safety and sanity. I believe Ovarit has a *activism*https://www.ovarit.com/o/Activism/hot@error made some post on safe activism as wellhttps://spinster.xyz/@error/posts/A3KxK3Y4VAm9kSLCDI
       
 (DIR) Post #A3eWRX96ItwI9WVz2e by error@spinster.xyz
       2021-01-27T05:11:21.571282Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @Icarus_girl96 @SphinxSister Thank you for including my posts!!!! Glad to see at least some people are taking advantage of those resources.
       
 (DIR) Post #A3fXaB424CjPNyn1SS by Icarus_girl96@spinster.xyz
       2021-01-26T13:32:02.447564Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @SphinxSister @errorThankyou for this! I definitely need help when it comes to social media - I like to remain fairly invisible and definitely find it intimidating and scary. I’ll look into those links :) The censoring is crazy! The TRA’s threaten rape and murder, physically vandalise and deface a woman’s rape shelter, attack and harass lesbians who won’t date them, yet those who criticise them are silenced? There are no words...
       
 (DIR) Post #A3fXaBYsDXOwvdDeWu by Butterfly_tsuji@spinster.xyz
       2021-01-27T13:46:14.858303Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 Different social media sites have different ways to kind of mediate the mob-Like on youtube you can turn comments of, put the mob there is huge people will mass report content they don’t like. [like what happened with Vanessa Vokey video] and there is a like/hate ration that is visible even with comments off.I have heard facebook is just awful with their mob control, I don’t really use it. Maybe a facebook user can chime in ?Instagram, I don’t think you can turn comments off, but you can ban certain words from the comment section. They don’t have a like/hate ration…. It only shows likes which is a lot more positive. You can block people here as well.There are a lot of radfem’s on tumblr…but a lot of troonies too. That where I learned about radical feminism. Tumblr has a blog format so anyone can reblog what you say. There are also option to let people ask questions on anonymous and to submit information yo your blog. Personally, I don’t let people submit anything, and I tell my friends to turn anon off [it just less hate that way, and I think if someone is going to talk shit say it to my virtual face]. People are less bold to send hate when asking things "anonymously" isn't an option. You can also tag all your post so you can find topics later o3o.@SphinxSister @error
       
 (DIR) Post #A3fXaBwylugS8OUu6S by Icarus_girl96@spinster.xyz
       2021-01-27T13:50:35.284796Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @SphinxSister @error Thankyou so much for all this information! I am genuinely clueless about everything social media related! Do you think it’s possible to remain anonymous on any of those sites?
       
 (DIR) Post #A3fXaCLnHeX7NM6imW by Butterfly_tsuji@spinster.xyz
       2021-01-27T14:05:55.825974Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 @SphinxSister @error I would like Error input because she seems rather tech savy, I personally have never given any personal information online and haven't had any problems.* knock on wood* You should be very careful about give any personal information at all that can be used to identify you later. Like I've read even showing a picture  near where you live can sometimes be done to track your location [@error or anyone else] tell me if im wrong. This is because modern phones collect some data when you take it ?So short answers is yes if you are careful. Always check the settings for any sneak information websites have about tracking information.
       
 (DIR) Post #A3fXaCmNgnnghoXxDs by Nebula@spinster.xyz
       2021-01-27T14:43:58.498791Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @Icarus_girl96 @SphinxSister @error Social media isn’t that scary, just be smart about it. People can figure out where you are by photographs because they can determine where landmarks are, crosswalks/street named, buildings, etc. This is why there is an app/database where people take photographs of their hotel rooms...It helps law enforcement track victims of child sexual abuse. They match the background information of the rooms to find out where the videos are being filmed.Phones also have GPS in them and whenever you send a text or make a call, signals are sent over different towers and law enforcement can trace your steps and location this way. I listen to a lot of true crime podcasts, and this is how they go about searching for missing people sometimes.
       
 (DIR) Post #A3fXaDEO0gCa6feJsG by Icarus_girl96@spinster.xyz
       2021-01-27T14:47:40.823541Z
       
       0 likes, 0 repeats
       
       @Nebula @Butterfly_tsuji @SphinxSister @error That’s really interesting - I also have an interest in true crime (which is maybe why I’m so anxious haha) It’s probably just fear of the unknown and I should work to get over that. I’m incompetent at technology in general though know people who are very good with it.
       
 (DIR) Post #A3fXaDecR9BZQ1vGlM by Nebula@spinster.xyz
       2021-01-27T15:13:29.384511Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 @Butterfly_tsuji @SphinxSister @error Ha - you don’t have to explain anxiety to me! I have multiple anxiety disorders. 😕 The thing with tech is that you just have to keep using it, and the fear associated with it eventually goes away. I am not an expert by any means, but I need to use different programs at work, and I am the type of person who likes to try and figure things out on my own before I ask IT for help. The funniest part is that they usually tell me to do stuff I’ve already tried to fix whatever is wrong. FAQ sections, google, and various message boards are your friend when troubleshooting.
       
 (DIR) Post #A3fXaE48uFbOhBreXw by Icarus_girl96@spinster.xyz
       2021-01-27T16:58:32.020157Z
       
       1 likes, 0 repeats
       
       @Nebula @Butterfly_tsuji @SphinxSister @error Sorry to hear you struggle with anxiety too 💚 second guessing yourself every minute is exhausting and anxiety is crippling (I’ve got GAD but it’s not as bad as it used to be) I’m kinda the opposite in that I ask for help even if I’m fairly sure I’ve got it right- which now I’m typing it out sounds quite pathetic! People can be so cruel online (thankfully not here) which unnerves me and makes me shy away from social media too.You’ve all been really helpful and encouraging here :)
       
 (DIR) Post #A3fanXXU7GO0iZd4Ma by xzy45@spinster.xyz
       2021-01-27T17:07:54.183603Z
       
       0 likes, 0 repeats
       
       @SphinxSister @Icarus_girl96 if it's any help to you, boris in parliament today announced that those who cannot travel miles to vaccine centres can go to their GP, or have home jab Sorry for your losses, I hope you are finding ways of coping with losing two friends in such a short time.  Hugs x
       
 (DIR) Post #A3fanXvweJx5wR4bUO by SphinxSister@spinster.xyz
       2021-01-27T17:10:17.292762Z
       
       0 likes, 0 repeats
       
       @xzy45 @Icarus_girl96 I'm not in the UK and I cannot take it because of my health not because of travelling. I hope it may help others. Thank you for your good wishes.
       
 (DIR) Post #A3fanYIdHy6H4ngiqu by xzy45@spinster.xyz
       2021-01-27T17:12:26.938108Z
       
       0 likes, 0 repeats
       
       @SphinxSister @Icarus_girl96 oh I'm sorry.  I completely misread, I took it from your numbered list of problems you are facing.You are welcome, hope your area will have a safer infection level soon so that you can perhaps be more involved in community groups, or even start one?
       
 (DIR) Post #A3fanYebyFgIAxyH6u by SphinxSister@spinster.xyz
       2021-01-27T17:16:51.168545Z
       
       0 likes, 0 repeats
       
       @xzy45 @Icarus_girl96 It is an easy mistake to make. I meant that since I cannot take it, I cannot risk travelling by bus so I'm stuck here. Re. infection levels I hope so, I hope they go down so that I can resume the activities I was doing before. Thank you. I hope you are freer to go out and do something practical.
       
 (DIR) Post #A3fanZ3mSfoXR1kNLE by Icarus_girl96@spinster.xyz
       2021-01-27T17:22:28.590597Z
       
       1 likes, 0 repeats
       
       @SphinxSister @xzy45 I’m so sorry - I’d forgotten you couldn’t get the vaccine :(  hopefully the more people who are vaccinated the safer you’ll be. I hope all of us can resume a somewhat normal life soon! I know a few people who have gotten the vaccine so hopefully things will improve and infection rates will drop as time goes on.
       
 (DIR) Post #A3gYyuDe7wfTUgbMg4 by error@spinster.xyz
       2021-01-28T04:49:16.282550Z
       
       0 likes, 0 repeats
       
       @Icarus_girl96 @Butterfly_tsuji @SphinxSister Yes and no, if you take precautions and some extra steps you can be mostly anonymous such as using Tor (A VPN will never make you anonymous as this is not what it is intended to do my write up on this is included below) https://ovarit.com/o/STEM/10794/tor-vs-vpnand if the site has the option use a .onion domain of the website, block tracking scripts using a addon like NoScript or Ublock Origin, or simply edit the about:config of your browser and manually disable features.If the conversation were to pivot to hacktivism like I used to engage in during the Arab Spring and early Anonymous era you can go further using tools like Whonix and Qubes.https://www.whonix.org/https://www.qubes-os.org/And my personal favorite to make sure I don't make an unsecured connection to my residential IP because some of my activities involving journalists, people at risk of organized crime etc. https://invidious.snopyta.org/watch?v=bn4xT4EIKBw
       
 (DIR) Post #A3gZoxwZWZ206VRJDs by error@spinster.xyz
       2021-01-28T04:58:41.051271Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @Icarus_girl96 @SphinxSister Thank you for valuing my input but I am male and not female ahhh help I've been mis sexed XD LOL couldn't resisit.Yes my past days as a bounty hunter of sorts exploited collected metadata among other measures to track bounties as well as social activity of those close to the target. Recently this was done on a huge scale utilizing facial data and Parlers horrendous security.As far as mobile phones are concerned most include a secondary "emergency power supply" attatched to the baseband of the board allowing for limited geo location for use with natural disasters and missing persons although this feature with many others are routinely abused to track dissidents as well as surveil parties of interest in corporate espionage, abusive families, etc.
       
 (DIR) Post #A3gcCg7tcVc3hdAfK4 by error@spinster.xyz
       2021-01-28T05:25:22.807282Z
       
       0 likes, 0 repeats
       
       @Butterfly_tsuji @Icarus_girl96 @SphinxSister And lets not even start to get into carrier vulnerabilities and SS7 or even SIM cards themselves that utilize ANCIENT protocols that often don't even require proper authentication similar to how the SWIFT transfer protocol functions for banks, these types of infrastructure are essentially full of holes and often times intentionally kept out of date to make honeypots or expected to be exploited infrastructure so as to know where and how and attacker will gain access in a very devil you know is better than the devil you don't situation.https://simjacker.com/This vulnerability affected something close to a billion mobile handsets, which equates to a significant portion of the planets internet population.
       
 (DIR) Post #A3ihetPYi0oB6Hcq1I by xzy45@spinster.xyz
       2021-01-28T12:52:10.921659Z
       
       0 likes, 0 repeats
       
       @error That's quite a lot of tech know how to stay safe isn't it?Is there a way of tracking that's done just through device proximity?I mean I can see what Bluetooth devices, and networks are around me, can a device ID be found via these means and used to track?Can a phone number be found via this route and used to track?What key information is used to follow someone around online?Can these questions be answered simply, or will my brain fry?
       
 (DIR) Post #A3ihetxafU1wnpY144 by error@spinster.xyz
       2021-01-29T05:35:57.361161Z
       
       0 likes, 0 repeats
       
       @xzy45 It all depends on your threat model or what you are intending to defend against. A journalist in say a war torn envirnment where coverage is threatening will have a much more extreme threat model than say a person with a stalker in that the capabilities available to the aggressor are worse for a nation state as opposed to only a single person.Yes if you look at the permissions of the apps on your mobile and computer most will scan for bluetooth, wifi, etc inorder to more accurately geolocate you and your device, it is also important to note that this is designed as a feature not a flaw for the purposes of diagnostic data and advertising.A phone number itself is fairly harmless although if you use your real identifiable information with your phone account this can provide a way to learn more about you while the phone the sim card is plugged into is full of gyroscopes, elevation sensors, data from your bluetooth and wifi which in extreme circumstances can be measured to develop an outline of a person similar to sonar or echolocation however this is usually used for recon with special operations groups.Every little thing is used to track someone, it has to be in order to be effective; granted there are varying degrees of tracking from simple observances for a few hours to extremely indepth surveillance over the course of years which social media has made very searchable and extremely convenient in that most of the time you will have geolocation data that is even kind enough to come with a data and time from the post so now I can make a map of movements with extreme precision and accuracy for even more precise surveillance if the device is compromised or a ground team follows the target.
       
 (DIR) Post #A3kgpKtNg8iRaZuUaW by xzy45@spinster.xyz
       2021-01-29T21:12:01.703435Z
       
       0 likes, 0 repeats
       
       @error I'm no journo in a war torn zone,  or an enemy of the state (AFAIK)!Just a device user, that it seems every app and device function robs data from!It's so bloody difficult to stay safe online Like you say about VPN not keeping you safe, yet everyone tries to hide behind one!  The teens use them widely for getting multiple free trial of netflix, or did do.I have to say that I haven't seen any permissions regarding Bluetooth or wireless network access.I know about the standard security, not sharing location and so on.I also don't agree that they're'features'.  They might be sold as features, like cameras are, but what they actually do is encouraged selfies and loss.of privacy all of which is being stripped and benefitted from!  Phones cost pennies to make.Was it apple that made over 100billUS$ in only 3 months?  Gross in times of such austerity that the few are making so much and ripping data from their users.I'm not sure who you are talking about from your comments.  Sometimes you seem to be talking about big corp data tracking, which wasn't my ask, but I get that it's definitely of note, but I'm struggling to pick through the bits that don't relate to big corp and data mining stuff, just the local phone proximity to another device and what could be harvested.Integer to your last point specifically when you say "if the device is compromised or a ground team.follow the target" - how does that work?Thanks so much for all of your detailed reply.
       
 (DIR) Post #A3kgpLF0Nk0sfe1lIG by error@spinster.xyz
       2021-01-30T04:36:05.171885Z
       
       0 likes, 0 repeats
       
       @xzy45 I'm talking from multiple perspectives from a trained team who is actively tracking someone for what ever reason, to corporate data tracking, to the novice script kiddie (baby hacker) who finds someone they view as interesting enough to dig through. I think that this is worth doing because I don't know who will read the information I post so I may as well make it as broad and all encompassing as I can so as to benefit as many as possible.Some time ago I worked as a bounty hunter, I would look through data and find points of interest that other bounty hunters and sometimes law enforcement would act on such as physically looking around the area for said target and in some cases send malware to a device although this was usually indirect through a contractor or similar method. Usually the malware will be send through an email or text message assuming someone close to the target doesn't turn on them for the bounty money.
       
 (DIR) Post #A3khrukzPD6tM2mKP2 by error@spinster.xyz
       2021-01-30T04:47:45.322157Z
       
       0 likes, 0 repeats
       
       @xzy45 Teens use VPNs to circumvent network blocks usually from schools or ISPs which is what VPNs were designed to do. Allow access to outside networks. The issue with VPNs as a service is the propensity to misrepresent the capabilities of the technology as well as the legal aspects of the company itself that runs the infrastructure (most VPNs don't actually control their infrastructure they rent from other providers that do not have the same policies and are often vulnerable to the very things the VPN purports to remedy!)As far as how the devices operate it isn't really a matter of opinion, it is simply how the current ecosystem works at least until a more viable alternative is made available which is currently being tested by Liberapay, Ko-Fi, Flattr, Patreon, Open Collective, Bounty Source, Buy Me A Coffee, and Tip4Commit.I'm talking from multiple perspectives from a trained team who is actively tracking someone for what ever reason, to corporate data tracking, to the novice script kiddie (baby hacker) who finds someone they view as interesting enough to dig through. I think that this is worth doing because I don't know who will read the information I post so I may as well make it as broad and all encompassing as I can so as to benefit as many as possible.Some time ago I worked as a bounty hunter, I would look through data and find points of interest that other bounty hunters and sometimes law enforcement would act on such as physically looking around the area for said target and in some cases send malware to a device although this was usually indirect through a contractor or similar method. Usually the malware will be send through an email or text message assuming someone close to the target doesn't turn on them for the bounty money.
       
 (DIR) Post #A3mAnwBvDqJ2TQn9Ye by xzy45@spinster.xyz
       2021-01-30T12:09:40.338712Z
       
       0 likes, 0 repeats
       
       @error do you find you would now be able to answer my particular concerns more specifically with this additional information?
       
 (DIR) Post #A3mAnwiBHu6u5Tsuq8 by error@spinster.xyz
       2021-01-30T21:46:42.351385Z
       
       0 likes, 0 repeats
       
       @xzy45 -Is there a way of tracking that's done just through device proximity?Yes retail establishments have wifi and bluetooth sensors in coordination with cameras to identify your devices ID, which can be used in conjunction with accounts like Google Maps for example to single out an individual from the crowd account information has been exploited in the wild via Bluetooth based attacks There are also several spyware vendors that allow for similar tracking as a way to save power and not show the intended target they are infected.-I mean I can see what Bluetooth devices, and networks are around me, can a device ID be found via these means and used to track?Yes the BlueBorne vulnerability was a great example of this.https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/blueborne-bluetooth-vulnerabilities-expose-billions-of-devices-to-hacking-Can a phone number be found via this route and used to track?Yes, phone numbers are very easy to grab with a laptop and antenna set, here is a set up that can receive sms messages, calls, device IDs, call logs, etc. for around 420 usd or 346 euros fairly affordable given its capabilities.https://hackaday.com/2016/04/08/build-your-own-gsm-base-station-for-fun-and-profit/-What key information is used to follow someone around online?Literallly anything public, as i described before my job was to parse through the information I was given to discern what was useful. There are multiple degrees of "Spiders" programs that grab information like the tools I linked to earlier that pull any data related to a username, email, phone number etc. This is all publically available with zero restrictions.
       
 (DIR) Post #A3miS4BeD9eRLHPF1U by xzy45@spinster.xyz
       2021-01-31T00:13:30.876941Z
       
       0 likes, 0 repeats
       
       @error Well it doesn't sound like anyone's data is safe, or them personally if all this is so easy to do.  How is anyone supposed to be safe from having their life mined and tracked?Thank you for all the detail.I don't have Bluetooth or WiFi on, but that doesn't exclude that every device emits a signal which an antenna and some cheap software can pick up and exploit.  How far can that go?  Log calls, listen to calls?  Track device activity?What tools can any of us here use to protect from this or is it too late?Many women are already doxxed online, and jobs discovered.  What can one do to protect from this?
       
 (DIR) Post #A3miS4caazCagq0l16 by xzy45@spinster.xyz
       2021-01-31T00:15:30.882284Z
       
       0 likes, 0 repeats
       
       @error how would you even know thisan antenna etc was picking up these things and tracking you?
       
 (DIR) Post #A3miS4x9MXeHibdB44 by error@spinster.xyz
       2021-01-31T04:03:44.414172Z
       
       0 likes, 0 repeats
       
       @xzy45 The most you would notice is a drop in signal strength but newer devices with stronger antenna sets will make up for the lost signal strength so quickly that most users won't even notice that unless they are graphing it.
       
 (DIR) Post #A3minV21b8cegI7p2G by error@spinster.xyz
       2021-01-31T04:07:36.896554Z
       
       0 likes, 0 repeats
       
       @xzy45 Well it doesn't sound like anyone's data is safe, or them personally if all this is so easy to do.-How is anyone supposed to be safe from having their life mined and tracked?Safety is relative people argueably take the same risks simply walking outside.Thank you for all the detail.-I don't have Bluetooth or WiFi on, but that doesn't exclude that every device emits a signal which an antenna and some cheap software can pick up and exploit. How far can that go? Log calls, listen to calls? Track device activity?Unless your device does not have a SIM card inserted it will still make data calls to any nearby antenna set usually Cellular towers. All of the above mentioned is possible and only limited by how much storage the attackers device has.-What tools can any of us here use to protect from this or is it too late?Encryption, sharing information and tactics and a willingness for people to listen and teach eachother.-Many women are already doxxed online, and jobs discovered. What can one do to protect from this?Minimize your online footprint and make sure to compartmentalize ALL activites that way if something fails it does not affect the rest of your activities.
       
 (DIR) Post #A3tFuuAB1M4e5Vpvl2 by xzy45@spinster.xyz
       2021-02-03T00:32:01.878360Z
       
       0 likes, 0 repeats
       
       @error so, how can any of this be detected?Obviously you can scan for downloaded malware, surveillance-ware if you like.  However, your phone would have to have been accessible by someone with bad intent.Is it possible even to stop online stalkers?Is the antenna you mention something that can be detected, as presumably it's receiving rather than emitting? Can it only receive unencrypted SMS, phone calls, and maybe whats entered on the device like account sign ins and typing into posts like here, and emails, even if they're encrypted?ThanksDo feel free to give up answering if you've had enough...if not, why do you do this?  Are you still a bounty hunter?  Shocked that all this is actually legal!!  I'm not sure it is though, I think data laws prohibit taking data without permission right?I don't think being online is the same as stepping outside, stepping outside doesn't tell anyone anything about you, you're an unknown.  It's also noticeable if someone starts to follow you, and you can presumably dispose of personal documents so as not to give anything away.
       
 (DIR) Post #A3tFuudxEdtRZrliAi by error@spinster.xyz
       2021-02-03T07:47:03.967747Z
       
       0 likes, 0 repeats
       
       @xzy45 -so, how can any of this be detected?Most of it cannot be detected by an average user which is why I feel the need to show people that these threats exist.-Obviously you can scan for downloaded malware, surveillance-ware if you like. However, your phone would have to have been accessible by someone with bad intent.It does not necessarily need to be physically accessible as vulnerabilities related to Mobile Data connections like LTE, Bluetooth, Wifi exist and are still effective to unpatched devices.-Is it possible even to stop online stalkers?Yes, most online stalkers while persistent are just like every other threat, all you need is to know how someone will attack in order to adequately guard against it like locking down your accounts, unplugging your router when it is not in use, etc.-Is the antenna you mention something that can be detected, as presumably it's receiving rather than emitting? Can it only receive unencrypted SMS, phone calls, and maybe whats entered on the device like account sign ins and typing into posts like here, and emails, even if they're encrypted?Not from the users side, no. It can detect and record unencryted phone calls and SMS messages. As far as mobile data connections it is possible and there have been several incidents in Europe and Asia regarding this however those were usually due to insiders with prior access to mobile or ISP networks.-Do feel free to give up answering if you've had enough...if not, why do you do this?It is not a problem at all, I enjoy interacting with others and giving them all the tools and tactics that I've learned. Someone took the time and effort to teach me so I see it as the least I can do is to pass that knowledge along.-Are you still a bounty hunter? Shocked that all this is actually legal!!Not anymore, physical bounty hunting is loosely restricted around the world although the USA, Canada, Phillipines, Mexico and several South American countries are fairly lucrative for the physical aspect whereas the digital can be done from anywhere. Most of the time private "operators" work in conjunction with law enforcement or some form of state aparatus like in Israel, Jordan, Libya, Australia etc.-I'm not sure it is though, I think data laws prohibit taking data without permission right?At the end of the day laws are concepts and require people to follow them in the first place, in most cases a burden of evidence is required in order to charge and hold someone accountable which many industries specialize in exploiting and not leaving anything to be traced or at least little enough to avoid serious consequences after all laws only apply to those that follow them or for those that reside in certain locations protected by a states backing. Examples like Hacking Team an Italian Company supposedly restricted by the GDPR that did not come to heel until multiple hacktivists became fed up with their filth, now Hacking Team operates with virtual immunity after being acquired by (don't quote me on this) an entity in the United Arab Emirates.https://en.wikipedia.org/wiki/Hacking_Teamhttps://arstechnica.com/information-technology/2016/04/how-hacking-team-got-hacked-phineas-phisher/-I don't think being online is the same as stepping outside, stepping outside doesn't tell anyone anything about you, you're an unknown. It's also noticeable if someone starts to follow you, and you can presumably dispose of personal documents so as not to give anything away.Everyone faces different threats, most people can't tell when they are being followed especially when the follower knows how to blend in or a team rotates. If someone were slightly persistent its extremely easy to access most cities CCTV camera networks without any tools lol as most are publically facing but I won't link to those resources for obvious reasons; in most cases yes but many people do not know how to properly dispose of documents hence why many large companies employ data destruction teams so people like me can't dig through trash and get information. I personally advise an electric current and fire coupled with physical destruction as most shreded documents only take a few hours to piece together by hand but less if more than one party is involved or a document scanner is used.
       
 (DIR) Post #A3xGMXtyWQRBNfoymG by xzy45@spinster.xyz
       2021-02-05T02:06:08.184357Z
       
       0 likes, 0 repeats
       
       @error thanks.  Hopefully this is good information to share on here as many of the women here are being targeted for threats and worse.So, this"so, how can any of this be detected?Most of it cannot be detected by an average user which is why I feel the need to show people that these threats exist."So knowing the risks exist, what to do?Risks:Online stalkingDoxxingClose proximity surveillance via person and detecting devices/monitoring and calls through antenna Are there resources somewhere so this 'nailing down' takes some specific forms?For instance I was once advised to cover my webcam, which I thought was frankly a bit crazy and paranoid, then turns out that this happens that webcams are used to watch the user!  And routers can be accessed, so not secure.I think it all sounds beyond the regular tech user to stand a chance of assessing the risk, locating it, and blocking effectively.Would that be fair to say?Also, I don't seem to get your replies on my notifications ( @mk )
       
 (DIR) Post #A3xGMYReVDNN47ZsGm by error@spinster.xyz
       2021-02-05T06:10:57.551206Z
       
       0 likes, 0 repeats
       
       @xzy45 -I think it all sounds beyond the regular tech user to stand a chance of assessing the risk, locating it, and blocking effectively.I may not have read the whole of the last comments lol much of the call and text interception can be circumvented by utilizing End to End encryption such as the kind used by the app Signal and Briar. Routers can be customized using custom firmware and a "deny all" policy (deny all port connections except those needed for use like 80 for http, 443 for https etc. Network level blocks can be circumvented using Tor. Honestly I would advise everyone to have secondary or third device if possible preferably with wifi and or cellular capabilities for emergency use prefferably kept in a safe place. As far as doxxing simply keeping your identity separate from your accounts like not using an email with your real name in it or connected to your personal mobile number etc.-Would that be fair to say?I think that given time and adequate resources anyone can become proficient in something.
       
 (DIR) Post #A4Bq6urEiqqk87aOWG by xzy45@spinster.xyz
       2021-02-11T15:22:51.763704Z
       
       0 likes, 0 repeats
       
       @error thank you.  I'm not sure what 2nd and 3rd device means?  How would a second and third device be used?Also, what is telegram like?  You haven't mentioned it, would you consider it secure?Does briar and signal do encrypted phone calling?I have heard of using a phone app that utilises your free phone call package for video calls.  I can't right now recall what's it's called, but I have concerns around the vidcall safety of the likes of zoom and Skype.
       
 (DIR) Post #A4Bq6vLitVEhefqk2S by error@spinster.xyz
       2021-02-12T06:57:28.192596Z
       
       0 likes, 0 repeats
       
       @xzy45  -I'm not sure what 2nd and 3rd device means? How would a second and third device be used?When I say a 2nd or 3rd device I mean a backup device that can be used incase of an emergency. In most western countries a prepaid device with cellular connection can be purchased without any identification and thus no connection to the user, in the case of european and australian user I offer a service that allows for mobile top ups without ID or similar information in exchange for cryptocurrency.Also, what is telegram like? You haven't mentioned it, would you consider it secure?I do not like Telegram, they have a custom encryption algorithm that is untested via cryptography or subpoeans, their bug bounty (paying hackers to fix bugs) is atrocious and designed to make any real vulnerabilities unpayable as per their terms.https://core.telegram.org/contest300K-Does briar and signal do encrypted phone calling?Briar is text only but allows for offline p2p groups via wifi, bluetooth, and Tor.Signal allows for encrypted voice and text.-I have heard of using a phone app that utilises your free phone call package for video calls. I can't right now recall what's it's called, but I have concerns around the vidcall safety of the likes of zoom and Skype.Signal allows for video calls although if you are looking for something with less latency and self hosting capabilities with plenty of documentation I would recommend looking into Jitsi.https://jitsi.org/
       
 (DIR) Post #A4Bqu4DwggUNMue3Rg by error@spinster.xyz
       2021-02-12T07:06:21.970295Z
       
       0 likes, 0 repeats
       
       @xzy45  -I'm not sure what 2nd and 3rd device means? How would a second and third device be used?When I say a 2nd or 3rd device I mean a backup device that can be used incase of an emergency. In most western countries a prepaid device with cellular connection can be purchased without any identification and thus no connection to the user, in the case of european and australian user I offer a service that allows for mobile top ups without ID or similar information in exchange for cryptocurrency. Think of it like a device that is in no way tied to you that you can use to communicate needed information to parties that need it without being disclosed that it is you specifically, this can be achieved by having associates utilize encrypted communication measures like Signal, Briar, PGP, etc.-Also, what is telegram like? You haven't mentioned it, would you consider it secure?I do not like Telegram, they have a custom encryption algorithm that is untested via cryptography or subpoeans, their bug bounty (paying hackers to fix bugs) is atrocious and designed to make any real vulnerabilities unpayable as per their terms. It is hardly a step up from SMS.https://core.telegram.org/contest300KTelegram is cloud based meaning it relies on 3rd parties in various jurisdictions that may or may not even require a subpoeana to view data. Telegrams nervous center or base of operations is located in Dubai which at best is a dubious location for cybersecurity reasons in that Dubai spies upon its civilians as much as the US, AU, RU, and UK.-Does briar and signal do encrypted phone calling?Briar is text only but allows for offline p2p groups via wifi, bluetooth, and Tor.Signal allows for encrypted voice and text.-I have heard of using a phone app that utilises your free phone call package for video calls. I can't right now recall what's it's called, but I have concerns around the vidcall safety of the likes of zoom and Skype.Signal allows for video calls although if you are looking for something with less latency and self hosting capabilities with plenty of documentation I would recommend looking into Jitsi.https://jitsi.org/
       
 (DIR) Post #A4O19AdfrU4JPVgfwG by xzy45@spinster.xyz
       2021-02-17T09:40:04.831429Z
       
       0 likes, 0 repeats
       
       @error thank you.  I only just found this.  For some reason I'm not seeing any notifications from you of replies, or seeing your replies in my home list, I have asked @mk about it, but no further forward yet, so I've been searching hard every now and again to check just in case.I think Jitsi was the vid call app I was thinking of.  I can't recall where I heard of it but i had heard it recommended before and was considering it because of Skype and zoom security failings.
       
 (DIR) Post #A4O19B6k7PJwrfHtFQ by error@spinster.xyz
       2021-02-18T03:57:47.149649Z
       
       0 likes, 0 repeats
       
       @xzy45 Yeah I've had some issues with that before, I'm fairly sure its just a bug. Jitsi is a fairly good solution due to its ability to be self hosted although this is mainly for more advanced users. A close second I would suggest would be the Element Matrix Client as it seems to have matured enough for a wider audience.https://element.io/Like all things federated they rely heavily on what the admin of the server allows and the precautions the admin takes, this can be good with a knowledgable admin however it can be a detriment with an inexperienced admin at the head if something isn't configured properly.
       
 (DIR) Post #A4zfKpyxfpIBpqHOMq by xzy45@spinster.xyz
       2021-02-28T18:23:22.025551Z
       
       0 likes, 0 repeats
       
       @error thank you for those tips
       
 (DIR) Post #A4zfKqPC6IHB9CYLFw by error@spinster.xyz
       2021-03-08T07:52:41.216830Z
       
       0 likes, 0 repeats
       
       @xzy45 Every little piece of information helps. Hopefully this will prove useful and effective to you.