Oh just buy whatever you want, for whatever reasons you used to make up to justify an overpriced trinket which people think boosts their social standing because it pretty, and overpriced. Just know its not secure and act accordingly. Use it to build up a nice pure profile. When you want to rob banks, build your nuke, or whatever, dont use it.
Or, have lots of trying to bait the spies. Call it art or something. Look up lots of terror stuff, like you are writing a book. Back, I dunno, 1000 years ago, when I first heard the oh so mad notion of echelon, I added an invisible signature to my email containing every naughty key word I could think of. Idea being to some how annoy the spooks. Yeah, childish and pointless, but it amused me.
Hmmm, maybe half a year of banging my head against a brick wall has had an effect after all.
Really any phone is exploited. When you've got a baseband with direct hardware access that the carrier can connect to there isn't really anything short of fully open hardware that is gonna save you.
All cell phone OSs are compromised to some degree. If Apple's claims about their crypto were auditable, I would say that iOS is the best from a security standpoint.
alan_cx|12 years ago
Or, have lots of trying to bait the spies. Call it art or something. Look up lots of terror stuff, like you are writing a book. Back, I dunno, 1000 years ago, when I first heard the oh so mad notion of echelon, I added an invisible signature to my email containing every naughty key word I could think of. Idea being to some how annoy the spooks. Yeah, childish and pointless, but it amused me.
Hmmm, maybe half a year of banging my head against a brick wall has had an effect after all.
melling|12 years ago
The sad fact is that it doesn't matter how secure your phone is because there's a weaker link in your security chain. You...
electic|12 years ago
supergauntlet|12 years ago
swampboy|12 years ago
parag_c_mehta|12 years ago
dubcanada|12 years ago
wyager|12 years ago