Essential Privacy: Mobile Phone & SIM Cards

preview_player
Показать описание

🔹🔹Services & Products Mentioned🔹🔹

*These links are affiliate links, which means that if you decide to purchase one of these products, we will receive a commission. Thank you for your support!

🔹🔹More great videos on mobile privacy🔹🔹

*********************
Video Timestamps
*********************
0:00 - Introduction with Mark Kreitzman
1:25 - What Does Your Mobile Provider Know About You?
5:40 - Privacy when Using Phones Internationally
10:15 - eSIM vs Physical SIM cards: Which is more Secure?
14:22 - Risks of QR codes
15:46 - New Threats to Mobile Phones
24:04 - Can Your Phone be Cloned?
30:42 - Quick Tips to Secure Your Mobile Device
32:50 - How does Efani build privacy & security?
40:44 - Being Private & Secure on Social Media apps
46:36 - Using Email Aliases for Security
49:05 - Is it possible to have a phone camera spied on?
52:42 - Are mobile phone apps secure to use?
57:03 - Is a Faraday bag worth buying?
1:00:40 - Best way to send sensitive documents via mobile?
1:03:45 - VPNs with a good reputation
1:06:13 - Does a Private OS like Graphene offer more protection?
1:11:29 - Should we cover our phone cameras for privacy?
1:13:45 - Security: Apple vs Android
1:17:01 - Closing Remarks with Mark Kreitzman
1:19:49 - Closing remarks with Josh

*********************

Josh from All Things Secured and Mark from Efani came together on this live webinar to discuss mobile privacy and security. What are the steps you need to take to ensure that your mobile provider and all the apps you use can't track everything you do? And could you benefit from the added SIM swap protections that a private SIM service like Efani provides?

#mobilesecurity #cybersecurity #privacy
Рекомендации по теме
Комментарии
Автор

Thank you! I was AT&T tech for 33 years. The public has a right to know how to keep privacy. Congress may never do it. Thank you both;.

mtnest
Автор

I would love to see more of these! Its great to put a face to a service that I am potentially trusting with my privacy.

danielkroft
Автор

My favorite channel! I love your videos, very informative and very helpful. Keep it up! Respects from Albania!

ipaemer
Автор

You know those instances where you accidentally stumbled on a video and you go boom! this is awesome info I wouldn't mind paying for. Thanks, man, hackers are getting smarter and we need to up our game too. Lazy says to use the same password for everything, sense "you" say no.

ameensams
Автор

Great podcast Josh... bonus points for asking excellent questions! What you should have asked him was when are you guys coming to Australia?

robtihanyi
Автор

Reporting it to the FBI is a really tough thing to do believe me. I’ve been targeted for six years and no one believes it then they send people around you to talk to you about other people and authorities then for some reason you’re targeted by them. It’s a shame I can’t get any help at all.

thomasamato
Автор

Love This !!! Explains a lot: Thank you so much for this information. Lisa

lisalinnae
Автор

It’s 1:06 am central. Ok I am wondering? For example…. You said that a MZ could basically act as the WiFi router clone and then when I got to a place that my phone would auto connect, my phone would actually connect to the clone router. If I disable auto connect and then get home or to my parents house and connect manually to the same password as before? How does my device not connect to the potential clone router regardless?

RebeccaBellaPugsMomOfficial
Автор

Josh, could you please follow up with Mark on how the network operator knows location of a subscriber ?
What I heard first minutes down into this conversation goes completely against what I know about mobile technology.
2:53
From what I know:
1. There is no way for network operator to know the exact location of a subscriber (via GPS data on subscriber’s phone), unless subscriber installed an app released by this operator, or operator buys data from 3rd parties.
2. Network operator can always get approximate location of the subscriber via triangulation method using location of cell towers to which subscriber is connected. They use IMEI of the device to uniquely identify a subscriber.

Could someone with knowledge please comment on this?

Ivanv
Автор

One thing Mark mentioned is that you need an e-mail address to set up a phone. I take it that he means the computer aspect of the phone. Surely you can have a mobile smartphone with a phone number and no e-mail address associated? It's been so long since I've use a mobile that I have yet to even see a SIM card. I've not used a mobile since about 13 or 14 years ago so I don't even know if the phone part of it is even an APP .

likebot.
Автор

I like how he uses the word scared while you guys are streaming on YouTube and people are watching it on their phones are you for real

MaxRuso
Автор

What is Efani doing about sting rays though? That's the most dangerous threat I'm my opinion.

ufkeys
Автор

I down loaded a QR reader and it wiped out apps on my cell phone and stuff on my PC I was not even using. Samsung got most of my APPs back on my phone. They said it wad the QR scanner I used. I am getting into securing my phone and Pcs now. That's why I am listening to u.

privatenosey
Автор

I have a smartphone without a sim card 💳. I want it that way (no phone bills haha)
What bothers me is that advertisers "seem" to know, because 90% of my ads are for cell phone providers ( sheesh some ive never even heard of)

ElaineGarcia-uoqj
Автор

I can see that removing automatic connection to known WiFi network could help only if the network doesn’t require a password (which one should not do in the first place)
1. How can someone clone your WiFi network if it has a WPA2 or better password protection ?
2. How would it help to connect to WiFi manually instead of automatically?

Ivanv
Автор

It’s probably more important to cancel your accounts for those old unused applications on your devices

olivermcintosh
Автор

Thank you and my God keep blessing you and your family and friends as well in times like this people should have more respect for each other it just shows what will happen when their neck is on the line some people is so cheakie💋🫂😎💯💙♥️stay blessed my baby

TonyMcKenzie-vzxn
Автор

This is exactly what I'm going through right now and what really is bothering me is that whoever is doing it knows that I know they are watching. Because I have been telling it/him. I've gotten hint messages from help/ support that I've been on. All my accounts have been updated with login credentials that I Don't have. And these companies will not help you if you have no way to verify yourself. I'm not doing well with this is because my family doesn't think it's possible.

PeekaBoo-wr
Автор

For the record the data collected in "2000 Mules" did not prove what the fraudster who produced the film claimed to prove.
That's why i call that film "2000 Jackasses." But, YES, that location data can be gathered.

joeytranchina
Автор

How do I know if my data is really breeched when I get a message i've been compromised. And should I go to Google for it to be corrected as suggested ?

glendaspeakstotheheart