The issue of fraud is becoming increasingly prevalent across Europe, and law enforcement agencies are becoming ever more adept at apprehending perpetrators and compromising their anonymity. In my considered opinion, the Google Pixel range of smartphones offers the most viable solution for those seeking to maintain anonymity. The Pixel 7 Pro model, in particular, is an excellent choice in this regard.
Conversely, I would NOT recommend the utilisation of iPhone devices for such purposes.
To achieve the desired level of anonymity, the following components are required:
- A suitable Google Pixel device, supported by the GrapheneOS. I would advise against utilising Pixel models from the 6 series.
- A Windows-based laptop.
- A USB-C cable.
- A reliable internet connection.
- The requisite APK files, which can be obtained from the provided links.
- E-Sim.
Acquiring the Device:
The most prudent approach when obtaining the necessary device is to procure a pre-owned unit. I would strongly advise against acquiring the device from any of your personal acquaintances, as this could potentially compromise the integrity of the anonymity measures. Furthermore, it is crucial that any financial transactions related to the purchase be conducted in cash, without the involvement of any personal identification or banking details.
It is paramount that the device is never associated with any personal SIM card or cellular service that can be traced back to you.
Installing GrapheneOS:
Before proceeding with the installation of GrapheneOS, ensure that you have downloaded the necessary tools for your computer. These can be obtained from the following link: https://developer.android.com/studio/re ... form-tools
Enabling Developer Options:
1. Open the Settings app on your phone.
2. Tap on "About phone".
3. Locate the "Build number" and tap it 7 times to unlock the developer options.
4. Navigate back to the Settings menu and select "Developer options".
5. Enable both "USB debugging" and "OEM unlocking".
GrapheneOS Web Installer:
Note that the Web Installer only works with Chrome or other Chromium-based browsers.
1. Unlock the bootloader by clicking on the "Unlock Bootloader" option and selecting your Pixel device from the pop-up menu. Your device will then reboot and reset itself completely. Confirm the action using the volume keys.
2. Download the GrapheneOS ROM by clicking on the "Download Release" button and waiting for the blue progress bar to complete.
3. Flash the ROM by clicking on the "Flash Release" button. Your device will automatically reboot several times during this process. Do not interact with the phone during this time.
4. Lock the bootloader by clicking on the "Lock Bootloader" button. This step is crucial, as an unlocked bootloader can compromise the security of your device.
Post-Installation Setup:
After the installation is complete, proceed to set up your phone as you normally would. However, it is essential to avoid using a fingerprint for authentication. Instead, use a password that is at least 20 characters long (combining numbers, letters and symbols), ensuring a level of strength comparable to or exceeding that of your hard drive encryption.
Configuring Privacy and Security Settings:
Developer Options
1. Disable Sensors: Enable the "Developer Settings" and then proceed to disable the various sensors, including the camera, microphone, and motion sensors. This is a crucial step to enhance your privacy and security.
2. Wi-Fi Automatic Turn off: Navigate to "Network & Internet" > "Internet" > "WLAN" > "Network Preferences" and set the "Turn off WLAN automatically" option to 1-3 hours. This will ensure that the Wi-Fi interface is automatically disabled after the specified time period.
3. Bluetooth Timeout: Under "Connected Devices" > "Bluetooth Timeout," set the timeout to 15 seconds. This will turn off the Bluetooth interface after a brief period of inactivity.
4. Auto Reboot: In the "Security" settings, enable the "Auto Reboot" feature and set the interval to 30 minutes. This is an extremely important step, as it prevents the decryption keys from being read from the RAM while the device is in an unlocked state.
5. Native Code Debugging: In the "Security" settings, ensure that the "Native Code Debugging" option is switched off. This will prevent any unwanted logging or debugging activities.
Installing Privacy-Focused Apps:
I recommend installing the following applications on your main profile:
1. F-Droid Store: This open-source app store provides a secure and privacy-focused alternative to the Google Play Store. You can access it at: https://f-droid.org/en/
2. Aurora Store: This is a secure and anonymous Google Play Store alternative, which you can find on the F-Droid store. It allows you to download apps directly from Google's servers without compromising your privacy.
3. Sentry: This application, available on F-Droid, provides device owner permissions. After installation, be sure to grant the necessary permissions by going to the "TURN ON" option.
4. Wasted: You can find this app on the F-Droid store. After installation, start the app and activate it. Allow the necessary permissions, and enable the "Wipe Data & Wipe eSIM" option. Then, enable the "Tile" option. Before doing so, delete the flight mode tile from the Quick Settings. The new tile will look identical to the flight mode tile, but when activated, it will reset the device.
5. LockUp APK: Install and activate this app, which can detect UFED attacks (such as Cellebrite UVM) and automatically reset the device in response.
It is important to note that, thanks to the capabilities of GrapheneOS, you can create multiple profiles on your device. I recommend installing Google services, if necessary, on a separate profile to maintain the highest level of privacy and security on your main profile.
Responsible Usage of an Anonymous Smartphone:
When utilizing an anonymous smartphone, it is crucial to adhere to the following guidelines to maintain your privacy and security:
1. SIM Card Usage: Avoid using any real-life (RL) registered SIM cards in the device, as the IMEI number can be used to trace the calls made through the cellular network.
2. Location Considerations: If you reside in a rural area, refrain from using the device at home, as this could potentially create a movement profile based on the radio masts.
3. Power Management: Ensure that the device is not switched on while you are carrying it, especially if you have a personal (RL) mobile phone. Always keep the anonymous device switched off to prevent the creation of a movement profile.
4. Overnight Usage: Do not leave the device powered on overnight, as you may not be able to turn it off in time if law enforcement were to intervene.
5. Switch your phone into battery save mode for stop background apps.
6. eSIM Utilization: Use eSIM (embedded SIM) cards, as they cannot be physically removed by authorities. Additionally, you can remotely reset the device using the "Wasted" app.
7. eSIM Rotation: Regularly change your eSIM to further enhance your anonymity.
8. Rooting Avoidance: Do not root or jailbreak the device, as this could compromise the security measures implemented by GrapheneOS.
9. VPN Usage: Use a reputable VPN service, such as Mullvad or Perfect Privacy, to protect your internet traffic and maintain anonymity. (Do not connect to your home WIFI).
10. App Permissions: Assign the minimum necessary permissions to each app, and revoke network access rights for any unused applications.
11. Data Separation: Ensure that you never combine your personal data with your work data on this anonymous device, and avoid leaving any traceable evidence.
By adhering to these guidelines, you can significantly improve the security and anonymity of your smartphone usage, reducing the risk of compromising your identity or illicit activities; but best OPSEC would be to not own a smartphone in the first place.
Setting up an Anonymous Smartphone
- TheVikingsofDW
- Posts: 283
- Joined: Thu Feb 01, 2024 5:54 pm
- Location: Budapest
Setting up an Anonymous Smartphone
Code: Select all
___ _____ __
| _ )/ __\ \ / /
| _ \ (__ \ \/\/ /
|___/\___| \_/\_/
----- TheVikingsOfDW -----
A Proud Staff Member Of BCW
- Captain489
- Posts: 1
- Joined: Thu May 16, 2024 3:52 am
Re: Setting up an Anonymous Smartphone
Great write up!
Can you explain how we can get an esim anonymously in Australia?
Can you explain how we can get an esim anonymously in Australia?
- TheVikingsofDW
- Posts: 283
- Joined: Thu Feb 01, 2024 5:54 pm
- Location: Budapest
Re: Setting up an Anonymous Smartphone
Captain489 wrote:Great write up!
Can you explain how we can get an esim anonymously in Australia?
To buy an eSIM as anonymously as possible in Australia, you can follow these steps:
1. Locating eSIM Providers Accepting Cryptocurrencies:
There exist certain international eSIM providers that accept cryptocurrencies as a form of payment. Ubigi and Airalo are two such companies that offer global connectivity, including coverage in Australia.
2. Purchasing Data Credits:
These providers typically allow the acquisition of data credits via credit card transactions. Additionally, third-party services, such as Bitrefill, may be employed to convert cryptocurrencies into acceptable gift cards or credits.
3. Providing Personal Information:
In the event that personal data is requested, one may consider downloading stolen documents from the deep web. However, it is crucial to note that this action constitutes identity theft and should be undertaken with the utmost caution, utilising a VPN, VPS, RDP, Socks, etc, etc, etc.
Code: Select all
___ _____ __
| _ )/ __\ \ / /
| _ \ (__ \ \/\/ /
|___/\___| \_/\_/
----- TheVikingsOfDW -----
A Proud Staff Member Of BCW