WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

475

The Feds sold and ran the 'privacy' An0m phones!

The Feds sold and ran the 'privacy' An0m phones!

(post is archived)

[–] 5 pts

In this day and age, it's unbelievable that so-called "drug kingpins" that make tens of millions in dollars don't hire any IT security.

[–] 2 pts

jungle spics and niggers

there's your answer

[–] 2 pts

I'm in IT and I'm always shocked at how cheap people are. Can't even be bothered to consult with a professional. Some ad they see looks appealing and they just start doing sloppy shit. Or i recommend something but they go with something else that's shit because it was $1 less.

Good luck finding an IT professional that would be willing to even work for them

[–] 4 pts

Feds also run and jerk off to child porn. There is nothing noble about the organization.

https://www.vice.com/en/article/bjg9j4/doj-fbi-child-pornography-sting-playpen-court-transcripts

This is when they got caught, if you think they stopped you don't know how evil our government is.

[–] 3 pts

Anti-White The Guardian: be very scared, goyim! Don't use open source!

[–] 0 pt

How is that what you get from this? It was a phone created by glows;

Australian federal police (AFP) who, together with the FBI, had conceived, built, marketed and sold the devices.

This isn't about open source at all. Not even remotely. I don't see "open source" at all in the article. Of the 4 results for "open" they are "opened" "opening" "open sesame" and "opening". Source is as follows: "human source" "confidential source". No results for FOSS or FLOSS.

[–] 1 pt (edited )

https://archive.md/mwFgv

Imagine paying $3,000 to give glowniggers your encryption keys so they can create evidence and say it came from you.

[–] 1 pt (edited )

only trust full open source

Nope. How can you verify that the object code faithfully embodies the source code, with no backdoor additions put in by the compiler, and the phone itself doesn't have any extra chips or processors or ROM?

Overall, what do you expect from a device aimed at people who would be a threat to government? I'd expect every privacy phone to be like this. Even ones that are legitimate companies are a perfect target for interception, from within or even just intercepting the devices in transit and backdooring them.

[–] 1 pt

some privacy centric hardware vendors offer anti interdiction measures to manage in transit fuckery.

[–] 1 pt

?

You compile and build opne source binaries yourself, and hope no circuit level hacks on hardware.

Backdooring in transit? I agree.

[–] 0 pt

Did you write and compile your compiler? Did the people who gave you its binary write and hand compile it? (Ken Thompson)

[–] -1 pt (edited )

compilers

Which are also FLOSS and scrutinized the fuck out of are the safest part of the entire chain. Why are you talking?

e; Literal "Don't trust FLOSS" kike post that kvetches like the absurd cunt that it is when called out.

[–] 1 pt

phone itself doesn't have any extra chips or processors or ROM?

That was actually just discovered to NON-smart push button candybar and flip phones in Russia.

[–] 0 pt (edited )

Nope. How can you verify that the object code faithfully embodies the source code,

By compiling yourself. You're lost if you think that.

and the phone itself doesn't have any extra chips or processors or ROM?

That's the only smart / correct part of your post. However the idea that glows give enough fucks about you or me to proceed with such an investigation into either you or me is absurd. They don't have the manpower, the human intelligence assets, the money, or the time to spy on Anticlutch's phone or Prairie's phone.

So why the fuck are you hating on open source? What it does do is prevent (((apple))) (((google))) (((facebook))) (((CNN))) (((citibank))) etc. from fucking with your data. Which is realistic, a thing that happens, and easily avoided.

You're suggesting otherwise because glowniggers at the NSA and GCHQ have access to ring privilege level -1 on your post pentium 4 intel / AMD etc.

[–] 0 pt

I'm not hating Open Source you pansy, just being realistic about compromised systems. If you want to be thorough, you have to consider stuff like this. Personally I find it interesting to study and think about. Practically you and I are of little interest, but if we were they'd have a dozen ways to monitor us. I'm not anti-open source, having written several things under GPL and modified BSD.

[–] 0 pt

Dumbasses. Buy a purism phone and use signal or maybe session.