News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Why Smartphones are more secure than computer desktops? : OpSec | Torhoo darknet markets

I was trying to find some tips on mobile opsec, and guess what🤔? I stumbled upon this super interesting topic while using the search option.⚠️/post/11ceb6e00a4a19ebaacd/#c-4c32fcbd89938575e7⚠️
First of all I just wanted to take a quick moment to say thank you for both of your contributions.🙏https://torhoo.cc/go.php?u=TDNVdlJHOXRNR1JoZVE9PQ==#, https://torhoo.cc/go.php?u=TDNVdlIzSmhlbVZzWkdFPQ==#.
I truly appreciate all of your great contributions guys😊.

Below are some thought-provoking quotes discussing this controversial subject.

https://torhoo.cc/go.php?u=TDNVdlIzSmhlbVZzWkdFPQ==# said:
There is no security or privacy protection on any Android or iOS system without dramatic workarounds which are outside of your wheelhouse. They were both OSs written to track your every movement so they can harvest and sell your data.


https://torhoo.cc/go.php?u=TDNVdlJHOXRNR1JoZVE9PQ==# answered:
Neither of your assumptions are correct.

Smartphones were designed with security in mind, desktop computers weren't. In fact modern phones are considered to be much more secure that any traditional computer.

Android has by default implemented several privacy protection like Storage Scope, MAC address randomization, strict app permissions policy etc. Desktop Os are far behind the privacy features offered by Android.

Evil companies have nothing to do with the security model of modern phones.

Nothing prevent Google from tracking you on your computer.

AOSP has no tracking codes, intrusive apps or lack of proper security mitigations. Graphene Os(based on the Android Open Source Project) is the best example of a secure, private operating system.

You should focus on providing factual information and avoiding spreading misinformation, we aren't on Reddit.



https://torhoo.cc/go.php?u=TDNVdlIzSmhlbVZzWkdFPQ==# then replied back:
Sorry, have to disagree. Yes, AOSP burns are more secure but GMS is on virtually all Android smartphones sold in the Western hemisphere. China burns a few AOSP flavors and I'd imagine it was a AOSP burn used for the FBI's "Trojan Shield/Greenlight" sting. The number of AOSP systems pales in comparison to GMS systems, hands down.

It is not that other solutions than GMS are available but rather that in the context of the OP they are over his head, just my impression.

And it is wholly incorrect to say "Nothing prevent Google from tracking you on your computer" which is the most 'we aren't on reddit' thing in your post. I would suggest that there are more than a few desktop OSs which are not Google tracked and your over-generalization is grossly wrong.

The Android smartphone world of GMS is, was, and shall forever be a Google tracking OS.


Wow, it just keeps getting more and more interesting. 😝😝

Dom0day argued that:
That's a significant deviation from your previous claims which you've stated

"There is no security or privacy protection on any Android or iOS system without dramatic workarounds"

"GMS is on virtually all Android smartphones sold in the Western hemisphere."

This is, unfortunately a false assumption.

AOSP does not contain Google Mobile Services or any tracking.
Quote from The android project

While the Android Open Source Project (AOSP) provides common, device-level functionalities such as email and calling, GMS is not part of AOSP. GMS is only available through a license with Google and delivers a holistic set of popular apps and cloud-based services.


By default, GrapheneOS does not come with any Google app or service installed.

Like the Android Open Source Project, GrapheneOS doesn't include Google apps and services. They won't ever be bundled with the OS. GrapheneOS includes a compatibility layer for sandboxed Play services to make user installed Play services apps able to run as fully sandboxed, unprivileged apps.



I understand that you may be confusing privacy with security. Let me clarify -

As proven, the Android operating system (AOSP) is not directly related to Google's privacy-invasive services, such as Google Play Services, which has high privileged permissions.
GrapheneOS lets you install Google Play Services in a sandboxed manner, like any other Android app.

"And it is wholly incorrect to say "Nothing prevent Google from tracking you on your computer" which is the most 'we aren't on reddit' thing in your post."



The purpose of that claim was to highlight that Google tracking is not limited to smartphones. I don't see what's incorrect with that statement.

"I would suggest that there are more than a few desktop OSs which are not Google tracked and your over-generalization is grossly wrong."



The same could be said for smartphones. Assuming that all smartphones are insecure, and a privacy nightmare is like saying that computers are superior even with Windows installed - it's a false assumption.

"The Android smartphone world of GMS is, was, and shall forever be a Google tracking OS."



The evidence points in a different direction. I don't think you need to apologize for disagreeing with me, but it's important to ensure that your claims are factual and not based on misinformation.

I value diverse perceptive, but your position is based on misleading information from unreliable sources, such as Reddit posts.


I used to think it was a good point, but after reading Dom0day's replies, I completely changed my mind.👀👀


Keep reading to find out the best part, it's at the end. 😅


Grazelda made some well-reasoned arguments as well:
Think what you'd like, but the post was directed at the OP. If you feel that he can easily root & replace to use Graphene then tech him how to do it. You do not seem to acknowledge that the open source AOSP is different from the proprietary GMS (Google Mobile Services), which I referred to. You understand that they are entirely different builds, yes?

I believe you either did not understand my contention in context or are picking out statements out of context in a hope to gain cred somehow. If you wish that track - please explain how you arrive at the perspective that "Android has by default implemented several privacy protection like ... MAC address randomization". Given that maybe 90% of the Android installs are of the GMS flavor, your statement provides a false understanding of the GMS world because you are saying that 'default GMS' implements MAC address randomization; which I am sure would give Google no end of surprise. As explained in the article portion of "AOSP, GMS, and their forensic implications":

Google Mobile Services are included with virtually all Android smartphones sold in the Western hemisphere. Google uses its services to collect large amounts of information from GMS-enabled devices. Location reporting, Google Account details, notes, search and browsing history, stored forms and passwords, synced application data, and a lot of other information is automatically transmitted to Google services by GMS-enabled devices.

Get over it.


The last reply from dom0 guy:
I choose to remain silent when I lack sufficient knowledge or expertise on a particular topic to avoid providing inaccurate or misleading information.

Unfortunately, not everyone follow the same approach :(

"If you feel that he can easily root & replace to use Graphene then tech him how to do it"



This simply prove that you don't know what you're talking about. Flashing Graphene Os on a pixel phone does not involve rooting. In fact rooting an android phone is the biggest mistake you could make from a security perspective.

You do not seem to acknowledge that the open source AOSP is different from the proprietary GMS (Google Mobile Services), which I referred to. You understand that they are entirely different builds, yes?



Do you read my replies? Or you're just trolling? I've acknowledged that AOSP provides the basic operating system and core functionality, while privacy intrusive services like GMS provides additional Google services and applications such as Google Play Store, Google Maps, and Gmail.
However, this does not change the fact that GMS is not part of AOSP and requires a separate license from Google to use.

You're the one who's making assumptions that aren't supported by the evidence, not me :-) plain and simple.

I believe you either did not understand my contention in context



You're the one who said "There is no security or privacy protection on any Android or iOS system without dramatic workarounds which are outside of your wheelhouse."

Not me :)

Your arguments are completely pointless. Claiming that all Android devices are inherently insecure and cannot be made private, based on false assumptions, is like saying "don't use a computer because it comes with Windows installed by default."

Your arguments lack substance and fail to recognize the nuances of the subject at hand. Suggesting that all Android devices are inherently insecure is a gross generalization that overlooks the fact that many Android devices are highly secure(much more that any traditional computer) and employ advanced security measures.

"picking out statements out of context in a hope to gain cred somehow. If you wish that track"



This doesn't make sense. I've been debunking your misinformation. My presence here is solely intended to rectify and refute any incorrect or misleading information that you may be propagating with a sense of enthusiasm.
Let me remind you that credibility is closely tied to the presence of verifiable and substantiated information.

"please explain how you arrive at the perspective that "Android has by default implemented several privacy protection like ... MAC address"



What are you trying to prove there?

Those are real privacy features implemented and used by default on modern Android phones.

"Given that maybe 90% of the Android installs are of the GMS flavor, your statement provides a false understanding of the GMS world because you are saying that 'default GMS' implements MAC address randomization; which I am sure would give Google no end of surprise. As explained in the article portion of "AOSP, GMS, and their forensic implications":



Already debunked. The evidences provided doesn't support those false assertions.

"Google Mobile Services are included with virtually all Android smartphones sold in the Western hemisphere. Google uses its services to collect large amounts of information from GMS-enabled devices. Location reporting, Google Account details, notes, search and browsing history, stored forms and passwords, synced application data, and a lot of other information is automatically transmitted to Google services by GMS-enabled devices."



Repeating quotes from articles may give the impression that one is knowledgeable about how smartphones work, but true understanding can only be attained through a deeper examination of the technology and its inner workings. "Everyone can know but the point is to understand".


It seems that you were the one who made baseless claims that smartphones cannot be made secure without extensive workarounds that are beyond your area of expertise. Now that it has been shown that such assumptions were false, you appear to be attempting to hide from the facts rather than admit your mistake.

Look, it's important to be willing to admit when you're wrong and make changes to your beliefs. Instead of stubbornly clinging to incorrect assumptions, you should take an objective look at the evidence and adjust your views accordingly. Don't try to convince yourself that you're right just to save face
that's not productive or honest. Stay open-minded and be willing to revise your thinking based on new information rather than spreading misinformation.


I'm so appreciative of the time and effort you both put into this😉😉. It was definitely worth the read!
The purpose of this post is to gain new insights and explore different perspectives on this important subject.👍
What are your thoughts? I keep seeing claims that smartphones are insecure. Is this true, or is it just misinformation?
Let me reach out to some resourceful users and see if they can help😍😎
https://torhoo.cc/go.php?u=TDNVdlNHVmhaRXBoYm1sMGIzST0=#, https://torhoo.cc/go.php?u=TDNVdmNHRnlkSGwwYVcxbA==#, https://torhoo.cc/go.php?u=TDNVdmQyaGhkSFZ3Y0E9PQ==#, https://torhoo.cc/go.php?u=TDNVdmNITjVZMmh2Ym5WMA==#, https://torhoo.cc/go.php?u=TDNVdlUyaGhhM2xpWldGMGN3PT0=#, https://torhoo.cc/go.php?u=TDNVdlpHOXVkR3hoZFdkbw==#,
https://torhoo.cc/go.php?u=TDNVdlVHRnlhWE09#, https://torhoo.cc/go.php?u=TDNVdlRIbGthV0ZTVVE9PQ==#

Thank you🤗
Thank you for tagging us. There are a lot of issues with tracking and privacy when it comes to many mobile devices. If you did not use a sim card that can help you out. Anyhow it is true that smartphones have more security from exploits or persistence by an attacker than your desktop computer does for multiple reasons. https://torhoo.cc/go.php?u=TDNVdlJHOXRNR1JoZVE9PQ==# summed it up pretty well in their comments here. We still recommend using Whonix or Tails on the darknet for most users mostly for convenience purposes. You will see a lot of issues with compatibility on mobile, the pages won't look right or be properly usable, the mobile keyboard is not fun to use. This is more for practical reasons. We recommend that when you are using mobile that you use different profiles for different activities similar to how you would hopefully use separate virtual machines on desktop.
/u/John_Dick 📢
3 points
2 years ago*
Thanks https://torhoo.cc/go.php?u=TDNVdmNITjVZMmh2Ym5WMA==# 🙄
You replies really helped me a lot when browsing dredit. That's why I thought I would tag you as you're a ressourful person 😛🤓
Thank you again 👋
/u/John_Dick 📢
1 points
2 years ago
Yeah I just figure out that by reading his last detailed replies.
I'll save this post because it is super interesting!
We really need to pin this post don't you think?

Also what's your personal preference between Whonix vs Tails?

What Os do you use if I may ask you sir😊😉
We prefer not to say what systems we are using specifically. Both of them have their benefits and drawbacks but we think Whonix is preferable in many scenarios when you use it properly. This means that your host machine needs to have full disk encryption, that you use multiple workstations for different activities, create snapshots so you can restore to a previously known clean state. Whonix introduces a lot of hardening features, isolates the gateway and workstation which is very important among many other helpful things. Tails has it's advantages too... it wipes memory on shutdown, is easy to use with little setup required, automatically enables MAC spoofing, works on most hardware, sets up LUKS when you enable persistence among other things.

Yes, this post or something like it needs to be pinned to combat a lot of the misconceptions that float around these forums.
/u/tarodactyl
1 points
2 years ago
I somewhat understand why use multiple users on GrapheneOS. But at the same time for anything "illicit" wouldn't you want to use one user so you can just quickly delete everything all at once?
People use multiple profiles on Android to isolate the activity of each profile. Android has great user isolation, if one profile is compromised than the other profiles won't be. Use another profile for all activities.
/u/tarodactyl
1 points
2 years ago
How would you even know if a profile is compromised? I just assumed it would be easier and best to have one for all your needs so you can delete quickly if you feel like someone might come by to look through it.
If you have a good password then it should not matter if someone is going to look at the device. If you're that worried about being compromised then just delete profiles after every use.
/u/tarodactyl
1 points
2 years ago
I'm not worried about it, just more of a what if situation. Like if it got seized.
/u/psuedonym
3 points
2 years ago
Thanks for the summary!
/u/John_Dick 📢
1 points
2 years ago
You're welcome 😉😉
My pleasure /u/John_Dick!
Thanks for sharing my comments and helping to stop the spread of misinformation.
/u/John_Dick 📢
2 points
2 years ago
Bro you're a truly legend 😘😘😍🙏
/u/John_Dick 📢
1 points
2 years ago
Thank you so much 😘😘

I'm curious to know what desktop Os you use for your darket stuff?
Are you using arch Linux or any other Linux based Os ?
I use Linux frequently, but not as a host system. Instead, I opt to use disposable Anon-Whonix on a virtual machine, which deletes all of its content upon shutting down.

To achieve this, I prefer to use Qubes OS, which is not a Linux distribution but instead a Xen distribution. Although it may not be as secure as a disposable Tor account on my phone, it is currently the least "insecure option" available for our computers.

As https://torhoo.cc/go.php?u=TDNVdmNITjVZMmh2Ym5WMA==# mentioned, using a computer with a 27-inch screen monitor is a more practical approach for these types of activities.
/u/Exalted
2 points
2 years ago
"Smartphones are more secure than computer desktops" - NSO Group
They spend millions to get exploits for smartphones. Exploits for Linux and Windows are far more common these days than those for iOS or AOSP. For Windows & Linux exploits regularly come out and are unpatched by users for days, weeks or months at a time.
/u/John_Dick 📢
1 points
2 years ago
That's just crazy 😳😳
Thanks for pointing that
/u/John_Dick 📢
1 points
2 years ago
I understand now, that what I previously thought was incorrect, and I'm surprised by this realization.😯🤐 I have come to understand that "truly legend" is a valid concept, contrary to my initial belief. If you have any additional information or insights regarding this idea or any other topic, please share it with me. I really want to learn more about this subject its fascinating🤗🤗
Did you watch The hated One's video about this subject?
/u/John_Dick 📢
2 points
2 years ago
"Baseless claims piled on top of each other do not magically transform into factual claims."

Oh jeez I can't stop laughing 😂😂😂😂😭😭😭😭

https://torhoo.cc/go.php?u=TDNVdlJHOXRNR1JoZVE9PQ==# calm down bro 😂😂😅
/u/Sticky_Herbalist
1 points
2 years ago
If you ever wonder how Google makes money it is from data collection from your phone. Sure they collect data from your computer too but that is not the significant part of their revenue.
Ah shucks, if I knew we'd get a review I would have worn my cape.
/u/John_Dick 📢
4 points
2 years ago
lol you did great my friend 💪👌
/u/flexible
0 points
2 years ago
hell to the know or is that no. Tl:dr
/u/John_Dick 📢
1 points
2 years ago
??🤔🤔🤔
I see the mobile security as two fold. There is 1.) hacking a device or locating it from the outside, then 2.) there is security from all the corporate influence from the inside. LE has access to both. Contrary to popular belief I would declare myself as believing mobiles are pretty darn secure today from being hacked or even located FROM THE OUTSIDE. From the inside, your phone knows your sleep schedule, all your criminal friends, and how many times you use the bathroom per day and where.
/u/John_Dick 📢
1 points
2 years ago*
Hello LydiaRQ thanks for your comment but I didn't understand the last part 🤔🤔
Basically that a hacker isn't a problem, but Apple (the insider) for and iPhone would know everything it wants to.
Apple only has the encryption keys to iCloud data and never claimed otherwise. They do not have the encryption keys to the actual iPhones as shown in their own policies.

We're discussing how phones and desktop computers compare in terms of security not on any issues related to Apple's Privacy policies.
"They do not have the encryption keys to the actual iPhones as shown in their own policies."

Love it. Of course not. They would never hack their own products no matter how much someone or a government pays them.
They would never hack their own products no matter how much someone or a government pays them.


There's no evidence to back up these conspiracy theories, so they're essentially baseless claims.
Well I'll keep on repeating my adagio: A smartphone is inherently insecure and really nothing more the self inflicted tracker. You can minimize some risks but overall, the thing has a GPS module, Wifi, Bluetooth and as cherry on the cake: triangulation. As mentioned earlier, I suggest to read out a smartphone with Celebrite Physical Analyzer and you'll be scared shitless to see what a privacy monster it is.
Celebrite only works when the victims phone is in the AFU state. Similar issue exists with desktops. If you decrypt your desktop computer and then just put on the lock screen, it can similarly be circumvented because the keys are stored in memory.
Baseless claims piled on top of each other do not magically transform into factual claims.

They are like empty vessels that make the most noise; they may sound convincing, but they hold no substance.

I'd be more than happy to debunk your misleading information, but it's going to have to wait until I have some free time.
Well looking forward :)
Well I'll keep on repeating my adagio


No one prevents you from sharing and repeating your myths.

A smartphone is inherently insecure


This is a common misunderstanding that many people have, particularly those who are less experienced with the android security model. It's been shared on forums like Reddit, but the truth is that experts in the field have debunked this myth many times before.

Where's the Full-verified boot on modern desktop computers Oss like Linux?(and no Secure Boot is not an alternative)

Just in case you don't know what I'm talking about, Full verified boot[1] is a critical security feature that helps prevent attackers from gaining root access to a device and persisting there undetected. The feature achieves this by verifying the integrity of each component of the system during the boot process, ensuring that they haven't been tampered with or modified in any way.

If an attacker attempts to modify a component of the system, such as the boot loader or kernel, full verified boot will detect this and prevent the device from booting up. This effectively prevents attackers from gaining root access and persisting there, as they would need to bypass the full verified boot process to do so.

In short, Full verified boot prevents an attacker from persisting as root.

There's no such implementation by default on modern desktop computers.

Where's is strong and EFFECTIVE App sandboxing[2] on modern desktop computers like Linux?

In Android, each app runs in its own sandboxed environment with a unique user ID and file system permissions, which means that each app has its own designated storage space and cannot access other apps' data or system files without explicit permission.

When I download an app on my phone, I immediately receive a prompt asking me to grant or revoke network permissions and select specific permissions that I want that specific app to use. However, implementing this level of control on a desktop computer is much more difficult to achieve. Therefore, this level of control and granularity cannot be easily implemented on desktop computers.

By default, Linux lacks a built-in system for enforcing strict sandboxing policies for applications. While it is possible to implement such policies using SELinux, this requires advanced knowledge of Linux administration and security, which is typically beyond the scope of the average Reddit /r privacy user. In linux, many applications have access to all your data by default using intrusive permissions like "Access to all home directory" which is a high security Risk.

Snap or Flatpak are a joke and poor implementations compared to the implementation of strong Android app sandboxing. There's so many things that can be said about those poor implementation, but that's not the purpose of this comment. With both of them it's either: Allow everything or deny everything. Many of these poor techniques, rely on a binary allow-or-deny approach which is not the good way to create security policies.


Android incorporates several modern exploit mitigations that are superior to those found in desktop operating systems. One of the key exploit mitigations used in Android is Address Space Layout Randomization (ASLR), which randomly arranges the memory layout of an application, making it more difficult for attackers to exploit memory vulnerabilities. Additionally, Android uses Control-Flow Integrity (CFI) to prevent attackers from taking control of a program's execution flow.

Android also incorporates several other exploit mitigations such as stack smashing protection, ShadowCallStack, heap corruption protection, and data execution prevention (DEP).

I could provide more evidence to refute your misinformation, but it would exceed the maximum character limit for this comment.

The notion that modern smartphones lack security is unfounded and often based on misconceptions. Often, individuals who hold this belief conflate Google's privacy-invasive services with security. However, modern smartphones feature robust security measures, including encryption, secure boot processes, and sandboxed applications, among others, that make them inherently more secure than traditional desktop computers.


Because of that, desktop computers generally have much more weaker security implementations compared to modern Android and iOS phones.


You can minimize some risks but overall, the thing has a GPS module, Wifi, Bluetooth and as cherry on the cake: triangulation


This is an oversimplification that does not accurately assess the strength of a security implementation.

This unfounded false assertion is frequently espoused by individuals who lack technical expertise and have relied solely on YouTube videos to form their understanding of how smartphone tracking operates.

Laptops and desktop computers often come with built-in WiFi/Bluetooth cards, and some even have GPS modules and SIM ports.This simply prove that this assertion is not specific to smartphones.

Removing hardware components may mitigate certain risks, but it won't necessarily make an insecure operating system secure. Conversely, having secure hardware does not guarantee security if the software and operating system design are not properly implemented.

I completely agree that using a SIM card in a phone or laptop can greatly impact one's security and privacy. Unfortunately, there is currently no solution to prevent that. That's why, personally, I avoid using SIM cards in any devices that I consider to be secure and anonymous.

Just because a software is open-source, it does not guarantee its security. Similarly, even if you use a so-called "privacy-respecting" OS, it does not automatically ensure that you won't be tracked on your smartphone or computer. The security and privacy of a system depend on multiple factors, including the implementation, configuration, and usage by the end-user.

To put it in simpler terms, based on my knowledge of various Android custom operating systems that violate user privacy, I would only suggest purchasing modern Google Pixel phones and installing Graphene OS for better security and privacy protection.

Have you ever wondered why Android exploits are so expensive?[3] It's not because Android is "inherently insecure". In fact, breaking into a modern Android phone is extremely difficult compared to operating systems like Mac OS, Windows, and it's even more easier for Linux. The reason Android exploits fetch a high price is because they require a combination of multiple zero-day vulnerabilities, which are very rare and expensive to obtain.

So, before making assumptions about Android's security, it's important to understand the complex factors that contribute to the value of exploits in the black market.

[1][url]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTl6YjNWeVkyVXVZVzVrY205cFpDNWpiMjB2Wkc5amN5OXpaV04xY21sMGVTOW1aV0YwZFhKbGN5OTJaWEpwWm1sbFpHSnZiM1E9#[/rurl]
[2][url]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTl6YjNWeVkyVXVZVzVrY205cFpDNWpiMjB2Wkc5amN5OXpaV04xY21sMGVTOW1aV0YwZFhKbGN5OTJaWEpwWm1sbFpHSnZiM1E9#/[url]
[3][url]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTk2WlhKdlpHbDFiUzVqYjIwdmNISnZaM0poYlM1b2RHMXM=#[/rul]
We could not have said it better ourselves. We completely agree with you here.

By default, Linux lacks a built-in system for enforcing strict sandboxing policies for applications. While it is possible to implement such policies using SELinux, this requires advanced knowledge of Linux administration and security, which is typically beyond the scope of the average Reddit /r privacy user. In linux, many applications have access to all your data by default using intrusive permissions like "Access to all home directory" which is a high security Risk.
Very true indeed. AppArmor and Bubblewrap are other options worth mentioning if anyone reading this wants to learn more. Kicksecure/Whonix pre configures some of these things.

If an attacker attempts to modify a component of the system, such as the boot loader or kernel, full verified boot will detect this and prevent the device from booting up. This effectively prevents attackers from gaining root access and persisting there, as they would need to bypass the full verified boot process to do so.


These don't do the same things but if anyone seeing this thread wants to know of some ways to protect your bootloader or protect against evil maid here is an article that talks about some options: https://tech.michaelaltfield.net/2023/02/16/evil-maid-heads-pureboot/
Awesome!
It's really comforting to know that there are people out there who share similar beliefs and ideas as me and many experts.

It can be tough to communicate technical concepts to others who aren't familiar with the jargon, but when I meet someone who gets it, it's like finding a kindred spirit <3. It's like we're part of a secret club with a shared language and understanding, and it feels really good to be a part of that.
Yes! We feel the same way. Though we do think that this should be much more common knowledge than it actually is since it is not information that is especially difficult to come across. Far too many users are listening to Reddit or YouTube videos where people have no idea what they are talking about. For anyone who actually does the research these should be easy conclusions to come to.
For some reason I couldn't modify my comment anymore so I'll add the links here:

[1]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTl6YjNWeVkyVXVZVzVrY205cFpDNWpiMjB2Wkc5amN5OXpaV04xY21sMGVTOW1aV0YwZFhKbGN5OTJaWEpwWm1sbFpHSnZiM1E9#
[2]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTl6YjNWeVkyVXVZVzVrY205cFpDNWpiMjB2Wkc5amN5OXpaV04xY21sMGVTOWhjSEF0YzJGdVpHSnZlQT09#
[3]https://torhoo.cc/go.php?u=YUhSMGNITTZMeTk2WlhKdlpHbDFiUzVqYjIwdmNISnZaM0poYlM1b2RHMXM=#

I highly recommend taking the time to watch this important video which emphasizes and supports all the points I have made in my comment. It provides valuable insights on the topic and will help you understand the importance of the security measures taken in modern Android devices:

https://watch.whatever.social/watch?v=Wd4Pa03LvLk
/u/remon69
1 points
2 years ago
Please do suggest the safest way to use the darknet on android, If there is one
It really depends on what you're trying to do. If you want to access the "darknet" in the safest way possible, then you should consider getting an Android phone that supports ⚠️Graphene Os.⚠️ The downside is that Graphene Os is only supported on Google Pixel phones, so you'll need to invest in one that supports 5 years of security updates (from the 6th generation and up).

Personally, I recommend not using a SIM card on this "anonymous phone" as it can decrease your security, privacy, and anonymity. Instead, when I browse the darknet on my phone, I always create a disposable temporary "Tor" account which is the most secure way to access the Tor darknet.

It's important to note that this configuration is not an option for everyone, and that's why I also recommend using "Whonix" for non-tech users who want to access the darknet anonymously.
/u/remon69
0 points
2 years ago
There's whonix on phone?
No, we don't have any plan to implement it on Android.
/u/John_Dick 📢
1 points
2 years ago
Thanks for your reply😘
Is Celebrite Physical Analyzer a movie or something? Any link?
Celebrite Physical Analyzer = cell phone analyzer program right?
https://en.wikipedia.org/wiki/Cellebrite
Yup that's the one. I got myself a copy of this monster for 50 bucks :)
Dang the toys you must have. You be rich boy.
/u/spacelasers
-2 points
2 years ago
cellebrite is a company that sells phone forensics software/devices to law enforcement.

back in 2016 the fbi were losing their shit with apple because they wouldn't unlock and decrypt a phone that was seized, can't remember if it was drugs or terrorism related but apple said fuck you

i think fbi sued apple but eventually gave up when cellebrite came to the rescue with an exploit that let them into the phone without needing apple's co-operation.

apple have since tightened up their game and from what i've heard cellebrite is just glorified file parser these days. i don't think they have any capabilities against the latest phones but can never be certain.
/u/John_Dick 📢
1 points
2 years ago
Thanks Yeah I remember that case it was a terrorism and Apple didn't want to give the decryption key so the FBI found an exploit 😫😯