How to Make Apps Safe (On De-Googled Phones)
الملخص
TLDRThe video provides insights on how to safely install apps on smartphones, particularly focusing on third-party applications. It discusses the inherent risks associated with these apps, such as data tracking and location monitoring, and emphasizes the importance of managing app permissions. The video also highlights the advantages of using open-source apps from FDroid, which are considered safer due to their transparency. Additionally, it addresses the privacy concerns related to popular apps from Google and Meta, urging users to be cautious about their data and permissions. Overall, the video aims to educate viewers on maintaining privacy while using mobile applications.
الوجبات الجاهزة
- 🔒 Always check app permissions before installation.
- 📍 Disable location access for apps when not in use.
- 🛡️ Use open-source apps from FDroid for better security.
- 🚫 Uninstall apps you no longer use to reduce risks.
- 📱 Be cautious with Google and Meta apps due to tracking.
- 🧭 Fitness apps can pose privacy risks with location data.
- 🔍 SE Linux helps manage app permissions effectively.
- 🛑 Firewall apps can help but have limitations.
- 📊 Data monetization is a key risk with free apps.
- 👥 Contact list permissions can lead to privacy breaches.
الجدول الزمني
- 00:00:00 - 00:05:00
用户在安装手机应用时应确保其安全性,许多人会检查隐藏的系统应用并禁用可疑的应用。使用防火墙应用程序(如Netguard)可以阻止互联网访问并跟踪应用流量。更安全的选择是使用来自FDroid的应用。手机操作系统本身(如iOS和Android)具有潜在的危险功能,包括24/7位置跟踪和身份监控。视频将重点讨论第三方应用的风险,尤其是对于普通用户的隐私问题。
- 00:05:00 - 00:10:00
视频将深入探讨Android架构,强调Android框架和Linux的关系。Android应用在一个独立的虚拟机中运行,无法直接访问设备驱动程序。每个应用都需要声明其使用的设备和功能,用户可以选择授予或拒绝这些权限。SE Linux安全模型确保应用无法秘密访问设备功能,用户的隐私得以保护。
- 00:10:00 - 00:15:00
一些应用程序可能会追踪用户的位置并出售收集的数据,尤其是免费应用程序。位置数据和广告ID的结合使得用户身份容易被识别。用户应定期检查应用权限,尤其是位置权限,以防止数据泄露。使用VPN可以保护IP地址,减少被追踪的风险。
- 00:15:00 - 00:25:05
用户应谨慎使用健身应用、Google应用和Meta应用,因为这些应用可能会收集大量个人数据。特别是Meta应用需要用户登录,导致更高的隐私风险。相对安全的选择是使用FDroid商店中的应用,因为这些应用经过审核,源代码公开,降低了数据收集的风险。总之,用户应尽量减少应用安装,定期检查权限,并关注应用的隐私政策。
الخريطة الذهنية
فيديو أسئلة وأجوبة
What are the risks of third-party apps?
Third-party apps can track user data, including location, and may sell this information to data aggregators.
How can I protect my privacy when using apps?
Check app permissions regularly, disable location access when not needed, and consider using open-source apps from FDroid.
Are Google and Meta apps safe to use?
Google and Meta apps can track user activities and require login, making them riskier for privacy.
What is the benefit of using FDroid?
FDroid apps are open-source, meaning their source code is publicly available and can be audited for safety.
How can I counter location tracking threats?
Block location permissions for apps and use a VPN to protect your IP address.
What should I do if an app requires location access?
Disable location permissions when not using the app and close the app when not in use.
Are fitness apps a privacy risk?
Yes, fitness apps can track location and combine it with other data, posing a privacy risk.
What is SE Linux?
SE Linux is a security model integrated into Linux that controls app permissions and access to device features.
Can firewall apps protect my data?
Firewall apps can help prevent data exfiltration, but they have limitations and may not catch all traffic.
What should I do with apps that I no longer use?
Uninstall apps that you are not using to minimize potential privacy risks.
عرض المزيد من ملخصات الفيديو
ศึก Logistics ในตลาด e-Commerce | BI Podcast
Benarkah Pria Tertarik Pada Inner Beauty Saja?
Orhangazi Deprem Fırtınası ve 17 Ağustos Sonrası Tetiklenen Fay Hattı #deprem
Podcast RRI Kendari " Update Sosmed, Upgrade Soul "
Dyslexia Awareness Part 1: Module 3 - Dyslexic Challenges
How sustainable are tomatoes? | DW Documentary
- 00:00:00A common question among my followers is
- 00:00:02how to make sure that they only install
- 00:00:05safe apps on their phone. Some more
- 00:00:08industrious users actually examine even
- 00:00:10hidden system apps and disable some if
- 00:00:13the name sounds suspicious. At other
- 00:00:16times, users will run protective
- 00:00:18firewall apps like Netguard to actually
- 00:00:20block internet access or track the
- 00:00:22amount of traffic for all apps while
- 00:00:24manually deciding which app should be
- 00:00:26given access to the network. Another
- 00:00:29approach taken by more serious
- 00:00:31security-minded people is to use only
- 00:00:33apps that come from FDroid. Now to make
- 00:00:36it clear, the most dangerous features of
- 00:00:38a phone are actually built into the
- 00:00:40operating system itself, meaning iOS and
- 00:00:43Google Android.
- 00:00:45These do 24/7 location tracking, contact
- 00:00:48tracing, even notification monitoring,
- 00:00:51and the identity of the phone is plainly
- 00:00:53attached to you. These OSS can track
- 00:00:56everything you do on the internet. Today
- 00:00:59though, we will isolate the problem only
- 00:01:02to third-party apps. If you're one of
- 00:01:04the smart few that use a degled Android
- 00:01:07phone, then the only realistic risks on
- 00:01:10your phone come from third-party apps.
- 00:01:13By the way, there's also the risk of the
- 00:01:15cell network side with the carriers
- 00:01:17interacting secretly with the salebased
- 00:01:20momentum or OEM supply chain attacks.
- 00:01:23Unfortunately, this potential risk
- 00:01:24applies to all phones, but typically
- 00:01:27this is something that would be used
- 00:01:28against high-V value targets like the
- 00:01:31Edward Snowden types or International
- 00:01:33Spycraft. So, we will skip that as well
- 00:01:36for now, though I will cover that in a
- 00:01:38separate video. We will talk about
- 00:01:41things that apply to average everyday
- 00:01:43people who just want privacy in their
- 00:01:45lives and teach you about things you can
- 00:01:48control. Stay right there.
- 00:01:57Once again, I will remind you that the
- 00:01:59focus of this video will be third-party
- 00:02:01apps. We will assume that neither Google
- 00:02:05nor Apple nor the OEM has directly
- 00:02:09inserted malware, spyware, or trackers
- 00:02:12on an open-source phone. Let's look at
- 00:02:15this chart of the Android architecture.
- 00:02:18And though iPhones are not really part
- 00:02:20of this explanation, you will find that
- 00:02:22the architecture of iOS is actually
- 00:02:24similar just using different
- 00:02:26nomenclature.
- 00:02:28And the very interesting detail about
- 00:02:30this architecture is that the actual
- 00:02:32nuts and bolts that operate the devices
- 00:02:35like displays, touchscreen, speakers,
- 00:02:37microphones, sensors, cellbased band
- 00:02:39modes, Bluetooth, Wi-Fi, GPS, and so on
- 00:02:42are actually just running on Linux. By
- 00:02:46the way, on iOS, the base OS is using
- 00:02:48another Unix like OS. So, very similar
- 00:02:51to Linux. Linux as used on Android
- 00:02:54devices requires that the source code be
- 00:02:57made public. This is why open-source
- 00:02:59operating systems are deemed to be safer
- 00:03:01because we can examine the code of both
- 00:03:03the Android framework which gives you
- 00:03:05the user interface and also the nuts and
- 00:03:07bolts which are visible on Linux. In
- 00:03:10this chart, you will see that the
- 00:03:12Android code is in the layer called
- 00:03:14Android framework in green and Linux is
- 00:03:18the section colored in yellow. And
- 00:03:21there's an intermediate translation
- 00:03:23layer in purple which connects
- 00:03:24communications between Android and Linux
- 00:03:28called the hardware abstraction layer.
- 00:03:33Android framework.
- 00:03:36Now let's just focus on the Android
- 00:03:38framework section which is grouped into
- 00:03:41system apps and third-party apps. What
- 00:03:44is interesting is that apps actually run
- 00:03:48under a supervisory layer which in this
- 00:03:51chart is called the Android runtime art.
- 00:03:54The apps cannot run by themselves. They
- 00:03:56cannot directly access any device
- 00:03:58drivers. Only the art interacts with the
- 00:04:02Linux side of things. The other
- 00:04:03interesting detail is that each app
- 00:04:05actually runs isolated in their own
- 00:04:07individual virtual machine. So apps
- 00:04:10cannot see other apps. Apps cannot
- 00:04:12directly interact with other apps. They
- 00:04:14do not share memory or resources outside
- 00:04:17of what's provided to them in the
- 00:04:19virtual machine. When things have to be
- 00:04:22shared between apps, Android will be an
- 00:04:25intermediary and provide a way to pass a
- 00:04:27resource and Android will announce the
- 00:04:30request so that any app can respond to
- 00:04:33provide information
- 00:04:38permissions.
- 00:04:40Apps that you download from an app store
- 00:04:43or are included with the OS cannot
- 00:04:45perform functions outside of what's in
- 00:04:47the Android open source project.
- 00:04:50And as it is open source, it cannot be
- 00:04:53hidden. So AOSP provides a limited set
- 00:04:57of functions and this is further tied to
- 00:04:59permissions that are built into Linux
- 00:05:01itself.
- 00:05:03There's a security model called SE Linux
- 00:05:06which is integrated it into the access
- 00:05:08of Linux functions and calls to device
- 00:05:11drivers. Each app will declare publicly
- 00:05:14what devices and features it will use on
- 00:05:16the device and you the user will be able
- 00:05:20to grant that permission or not. One
- 00:05:23thing that is not possible is for an app
- 00:05:25to secretly not declare that it needs to
- 00:05:27use a device like a camera and then
- 00:05:30without permission turn it on later. And
- 00:05:33again this is locked down by the SE
- 00:05:36Linux security policies and it is
- 00:05:39available in open source so you can see
- 00:05:40it. This design ensures that each app
- 00:05:44cannot perform functions outside of what
- 00:05:46is stated by the developer of the app
- 00:05:49and again only if the user grants that
- 00:05:52permission
- 00:05:55location threat.
- 00:05:59Some apps are very dangerous. As I've
- 00:06:02already revealed in a recent video on
- 00:06:04Fog Data Science and another on Anomaly
- 00:06:076, these companies actually track users
- 00:06:10on their phones using apps you willingly
- 00:06:13install. Just like you happily buying
- 00:06:15your newest iPhone knowing that the
- 00:06:17iPhone will know your activities and
- 00:06:19locations 24/7.
- 00:06:21But sticking to just apps, the main risk
- 00:06:24of apps is that they sell the data they
- 00:06:26collect. And this is important because
- 00:06:28it is a monetization method.
- 00:06:31The app may be free but you are the
- 00:06:34product so they will take advantage of
- 00:06:35that and make money with your data.
- 00:06:39The primary piece of data tracked is
- 00:06:41your location and some constant ID they
- 00:06:44can use that could be created by the app
- 00:06:47itself or use one allowed by the OS
- 00:06:50which is typically the advertising ID.
- 00:06:53Fortunately, open source phones do not
- 00:06:55have an advertising ID. So this is one
- 00:06:58of the biggest benefits. However, the
- 00:07:00offending app can still create some
- 00:07:02temporary ID and pass it with the
- 00:07:05location data. Someone will always tell
- 00:07:08me that the location data is anonymous
- 00:07:10as these apps are not allowed to send
- 00:07:13data like name of the user or a Google
- 00:07:15ID.
- 00:07:17But as fog data science has already
- 00:07:19proven, this is not an issue. And this
- 00:07:22particular service is used heavily by
- 00:07:24law enforcement.
- 00:07:26If you go to a protest and your location
- 00:07:28is then registered by some app running
- 00:07:31in the background, as long as all your
- 00:07:33other locations are constantly being
- 00:07:35captured by the app, then you are easily
- 00:07:38identified just from seeing where you go
- 00:07:40home to.
- 00:07:42So, a series of location points
- 00:07:44attributed to a particular user, even
- 00:07:47anonymous ones, will yield the actual
- 00:07:49identity. All that has to be done is to
- 00:07:51match the home address to public
- 00:07:53databases like driver's licenses, credit
- 00:07:55reports, and property records, and
- 00:07:57they've got you.
- 00:08:00Location plus IP address threat.
- 00:08:04There's a second layer of threats tied
- 00:08:06to the location threat. This is when
- 00:08:08data is captured in addition to
- 00:08:10location. This is when the location is
- 00:08:12sent together with an IP address to the
- 00:08:14data aggregator company. This was a
- 00:08:16technique used to create a very common
- 00:08:18database called the reverse IP lookup.
- 00:08:21What this does is attach a real fine
- 00:08:23location to an IP address. Normally IP
- 00:08:26addresses are only up to the level of
- 00:08:29the ISB center in the area. In small
- 00:08:32cities, this can be the entire city. In
- 00:08:34larger areas like Los Angeles, the IP
- 00:08:36address can be attributed to specific
- 00:08:38neighborhoods.
- 00:08:39At least this is what is publicly
- 00:08:41available using free services like what
- 00:08:44is my IP address.com.
- 00:08:46But if you pay for access to the reverse
- 00:08:49IP lookup database then you can possibly
- 00:08:52get a precise location especially if you
- 00:08:55are using your home network to within 6
- 00:08:57ft. This is important data for financial
- 00:09:00institutions for example. Often this
- 00:09:02service is called verified location. and
- 00:09:05they're able to get this more precise
- 00:09:07location by creating a history of
- 00:09:09location coordinates tied to an IP
- 00:09:11address as captured by apps. This makes
- 00:09:15the IP address a very dangerous piece of
- 00:09:17data all of a sudden.
- 00:09:21How to counter these location threats?
- 00:09:24Currently, the surveillance in location
- 00:09:26is a huge thing. Likely a big chunk of
- 00:09:29the population shows up in these
- 00:09:30location database if you're cavalier
- 00:09:33about the use of apps. So, the first
- 00:09:35thing to do is to go to your phone and
- 00:09:38check app permissions. Depending on the
- 00:09:40phone, you can even go to settings and
- 00:09:42look specifically at those that you gave
- 00:09:45location permissions too. This is the
- 00:09:48easiest threat to counter since simply
- 00:09:50blocking location permissions will stop
- 00:09:53the exfiltration of your data. Without
- 00:09:56location data, even the IP address could
- 00:09:58prove meaningless on an open-source
- 00:10:01phone. Now if you use a VPN you can
- 00:10:04obviously protect your IP address from
- 00:10:06being acquired. This is extremely
- 00:10:08important when you are at home. It is
- 00:10:11less important on sale data or Starlink
- 00:10:14and the reason is that many people will
- 00:10:16be sharing the IP address in these
- 00:10:17cases. So these types of services will
- 00:10:20not directly tie an IP address to a
- 00:10:23particular individual. The harder
- 00:10:25problem is that some apps will not run
- 00:10:28without you giving them permissions for
- 00:10:30location. An example here is Yelp,
- 00:10:33Craigslist, Ways, and another one is the
- 00:10:36Weather Channel app. And the average
- 00:10:38person will give in. In my mind, these
- 00:10:41are examples of ultra dangerous apps
- 00:10:44that will exfiltrate your data to a
- 00:10:46location database aggregator and will
- 00:10:49end up on Fog Data Science and Anomaly
- 00:10:516. Can you still use these apps? If you
- 00:10:55have to use them, I would always disable
- 00:10:57location permissions when I'm not using
- 00:11:00them. And for better peace of mind, I
- 00:11:02would shut down the apps when not in use
- 00:11:04so they're not running in the
- 00:11:06background. Again, they force you to
- 00:11:09give your permission. So, it is actually
- 00:11:11your fault that you agree, but correct
- 00:11:14it now by scanning through all the apps
- 00:11:16with location permissions. So, mostly
- 00:11:19they are all off. The clue is that the
- 00:11:22apps are typically free and require
- 00:11:24location.
- 00:11:27Fitness apps.
- 00:11:30Fitness apps are another kind of
- 00:11:32location risk. Often they're tied to
- 00:11:35locations as well because you're
- 00:11:36recording things like 10,000 steps or
- 00:11:39some such. But fitness apps have another
- 00:11:41risk and that is to combine the location
- 00:11:43history with gyro sensors. So as I said
- 00:11:47earlier that knowing your gyro data like
- 00:11:49every step will actually be enough to
- 00:11:51roughly gauge your location even if you
- 00:11:54turn your location data off. I recall
- 00:11:57some Russian officer using fitness apps
- 00:11:59extensively and of course this is common
- 00:12:02for military personnel and then some
- 00:12:04intelligence operatives were able to
- 00:12:06track his jogging path and he was
- 00:12:08assassinated on that route. I know so
- 00:12:11many people using fitness apps. It's
- 00:12:13likely better to use a Garmin watch that
- 00:12:16has fitness data but not connected to
- 00:12:18the internet and not connected to your
- 00:12:20phone. I'm sure these watches can
- 00:12:22connect to phone apps, but see if you
- 00:12:24can use it without connecting to a
- 00:12:26phone.
- 00:12:29Google apps.
- 00:12:32There's a category of apps primarily
- 00:12:34those from Google that can monitor your
- 00:12:36activities and IP addresses and connect
- 00:12:38it to what you are doing on another
- 00:12:40device like a desktop computer. This is
- 00:12:43even with location off. The biggest
- 00:12:46identifier here is the Google ID.
- 00:12:49Examples of these apps are Gmail,
- 00:12:52YouTube, Google Maps, Ways again, Google
- 00:12:55Drive, Google Photos, and even Chrome.
- 00:12:58These apps will send a constant
- 00:13:00telemetry of your IP address and Google
- 00:13:03ID to Google. Then this can be matched
- 00:13:05to other devices you're logged onto.
- 00:13:08This is called crossdevice tracking.
- 00:13:11These apps can also store a cookie of
- 00:13:14the Google ID on your mobile browser and
- 00:13:16this is the instrument used to track
- 00:13:19everything you do on any other platform.
- 00:13:22Actually, the idea of having a Google ID
- 00:13:24tracking your every move on the internet
- 00:13:26is a big issue I frequently discussed
- 00:13:29and is the main threat of big tech on
- 00:13:31the internet. However, what is
- 00:13:33interesting is that an open-source or
- 00:13:36deoogle phone has no Google ID. Thus,
- 00:13:39the risk comes only if you actually log
- 00:13:42into a Google app and put in your
- 00:13:44credentials.
- 00:13:46Fortunately, it is not often necessary
- 00:13:48to do that. I have a Bra 3 phone which
- 00:13:51is open source running EOD OS and on
- 00:13:54this I installed a Google app which has
- 00:13:55search and voice search, YouTube, Google
- 00:13:58Translate, Google Maps and Ways. Now, I
- 00:14:02specifically chose these apps as
- 00:14:04examples because none of these apps
- 00:14:07require me to be logged into Google.
- 00:14:11If you do the exact same steps of
- 00:14:13denying location permissions and not
- 00:14:15logging in, then these apps are not
- 00:14:17really as dangerous as they sound. I
- 00:14:20actually can't think of too many threats
- 00:14:22with their use. Perhaps in this set, the
- 00:14:25biggest threat potentially comes from
- 00:14:27voice signatures or voice prints. And
- 00:14:30when you use ways to take you home, it
- 00:14:32will learn where home is and then sell
- 00:14:34that data to Fog Data Science. But
- 00:14:37otherwise, they're not that risky in
- 00:14:39this particular use. And especially if
- 00:14:42you use a VPN at home, this is even less
- 00:14:44of an issue. Now, Google apps that
- 00:14:47require you to log in are automatically
- 00:14:49dangerous as they provide a constant
- 00:14:52telemetry of IP addresses even if you
- 00:14:55block location permission.
- 00:14:57This include apps like Gmail, Google
- 00:15:00Docs, Google Drive and so on since these
- 00:15:02are impossible to run without logging
- 00:15:04in. Just understand that their use opens
- 00:15:08you up to tracking dangers.
- 00:15:13Meta apps.
- 00:15:16Meta apps meaning specifically Facebook,
- 00:15:18Instagram and WhatsApp are very
- 00:15:21dangerous apps. And that is because
- 00:15:23unlike in other apps, Meta knows
- 00:15:25precisely who you are. And this is
- 00:15:27crowdverified by your friends. It also
- 00:15:30knows all your location, retrieves your
- 00:15:32contact list daily, and creates a
- 00:15:35dynamic relationship map from this that
- 00:15:38establishes who you know and who you
- 00:15:40circulate with, including specific
- 00:15:42activities you participate in. Meta does
- 00:15:46not hide that it does this intense
- 00:15:49collection of data. And unlike the
- 00:15:51Google apps I mentioned earlier, it is
- 00:15:53not possible to use meta without logging
- 00:15:55in. Meta also clearly states that it
- 00:15:58combines the information about you from
- 00:15:59all its apps. So you cannot really use
- 00:16:02WhatsApp anonymously.
- 00:16:04And just like Google, the Facebook ID is
- 00:16:06an internet identifier that is
- 00:16:08recognized by any site that embeds a
- 00:16:11Facebook login, Facebook ad or Facebook
- 00:16:14like button. This means a lot of
- 00:16:16websites can track you simply by using
- 00:16:18Meta. This is a case where I can't
- 00:16:20really find any safe solutions for. So
- 00:16:23for privacy reasons, I cannot ever
- 00:16:25recommend to anyone that you use any of
- 00:16:27these apps. Once you join one, then
- 00:16:30anyone you connect to is part of the
- 00:16:32surveillance algorithm.
- 00:16:36Contactless dangers.
- 00:16:39While Facebook is number one when it
- 00:16:41comes to taking contactless information
- 00:16:43daily, others include Tik Tok, LinkedIn,
- 00:16:45and many social media apps. Contact
- 00:16:48lists collection allow the establishing
- 00:16:51of these relationship maps and it can be
- 00:16:54used to connect people by phone number.
- 00:16:57Just in general, I always ban apps that
- 00:16:59will send my contact list to some
- 00:17:01external database like what most social
- 00:17:04media apps do. However, some apps like
- 00:17:07your contactless app or your phone app
- 00:17:10does not connect to the internet per se
- 00:17:12and thus there is no danger to giving it
- 00:17:15contactless permissions. Remember that
- 00:17:18contact list are downloaded daily. Once
- 00:17:20I installed Tik Tok and did not give it
- 00:17:22contactless permissions, but Tik Tok is
- 00:17:25so suspiciously aggressive with contact
- 00:17:27list that it asks you for permission
- 00:17:30each time you launch it. One time I
- 00:17:32accidentally accepted the permission and
- 00:17:35it immediately uploaded my contact list.
- 00:17:38At that moment I closed the account.
- 00:17:43Foid apps.
- 00:17:46For those of you with the Google phones,
- 00:17:48you will find that you have the choice
- 00:17:50of using the Froid store. I will tell
- 00:17:53you now that these Foid apps are going
- 00:17:55to be very safe and no secret data
- 00:17:58collection can occur. The reason is that
- 00:18:00to be listed in the Froid store, you
- 00:18:03must submit your app source code to Foid
- 00:18:05itself and Foid independently builds
- 00:18:08your app from the source code and that's
- 00:18:10what's made available in the store. And
- 00:18:11these apps must not connect secretly to
- 00:18:13Google. Foid can examine source code and
- 00:18:16see if there's some hanky panky going on
- 00:18:18with your data. So this is a case where
- 00:18:20you can just automatically trust this
- 00:18:22source. Foid apps may not have similar
- 00:18:26versions on the Google Play Store, but
- 00:18:28if they do, I would use the Foid version
- 00:18:31as much as possible. For example, if you
- 00:18:33want an ultra safe map app, instead of
- 00:18:36using Google Maps or even Magic Earth,
- 00:18:38you can find some app like Osmand on
- 00:18:41Foid and it will be the safer option. An
- 00:18:45example application of this is with
- 00:18:47weather apps. Since location data is
- 00:18:49frequently sold by weather apps, this is
- 00:18:51a case where I would go to Foid itself
- 00:18:54and find some app like Breezy weather.
- 00:18:59Other possible threats.
- 00:19:02Other potential threats that scare
- 00:19:04people are apps that will just turn on
- 00:19:06the camera or microphone. While these
- 00:19:08are legitimate features when the app
- 00:19:10captures photos and videos, these are
- 00:19:13real possibilities. So, I would rarely
- 00:19:15grant access to camera photos and
- 00:19:17videos. But be careful here as these
- 00:19:20permissions are often forgotten on the
- 00:19:22browser. If you screw this part up, you
- 00:19:25have to blame yourself since the cause
- 00:19:27of this is bad permissions.
- 00:19:30Another real threat is some thirdparty
- 00:19:33app acquiring device identifiers like
- 00:19:35MAC addresses, IMEI, MZ and so on. These
- 00:19:38are identifiers that actually are unique
- 00:19:41to your phone and thus can be used to
- 00:19:42track particular users. These
- 00:19:45identifiers reside in the Linux layer.
- 00:19:48So a Linux executable code could read
- 00:19:50these values. But this is no longer a
- 00:19:52threat nowadays because for many years
- 00:19:54now this information is now locked down
- 00:19:56by permissions and not available to
- 00:19:59thirdparty apps on a Google phone. No
- 00:20:02Google system app can read it either
- 00:20:04because they don't exist. A threat that
- 00:20:07was recently identified was the
- 00:20:08government starting monitoring
- 00:20:10notifications. Notifications are not
- 00:20:12encrypted and if your device can be
- 00:20:14identified then it is possible that some
- 00:20:16can read your notifications. My response
- 00:20:19to this is to limit which apps can send
- 00:20:22notifications. One particular conspiracy
- 00:20:25theory is that apps will interact with
- 00:20:27your body using WBAN WBAN using nanobots
- 00:20:32injected via vaccine. This one I do not
- 00:20:35bias risk. If such a radio transmission
- 00:20:37exists, it should be easily detected
- 00:20:40using common digital radio tools and
- 00:20:42hidden communications should not be
- 00:20:44possible on a third-party app. Not sure
- 00:20:47why people worry about this when the
- 00:20:49tracking of all your activities is done
- 00:20:50in a more obvious manner using simpler
- 00:20:53methods.
- 00:20:57Firewalls.
- 00:20:59Is it necessary to use an Android
- 00:21:01firewall app like Netgard? And can this
- 00:21:04even catch anything?
- 00:21:07Unfortunately, I don't think firewall
- 00:21:09apps are useful at tracking Linux level
- 00:21:11traffic since that is beyond the control
- 00:21:14of Android apps. So things happening at
- 00:21:17the OS level in Linux may not be
- 00:21:19visible. Meaning don't expect a
- 00:21:22framework level app to record things
- 00:21:24happening outside of the Android
- 00:21:26framework. This is a big giant hole.
- 00:21:29However, if you are experimenting with
- 00:21:31some new app, you can make sure it will
- 00:21:34not reach out with your data by
- 00:21:36activating a firewall to stop it from
- 00:21:38communicating.
- 00:21:39Let me just warn you of limitations
- 00:21:42though. While you may be able to stop
- 00:21:44your data from being exfiltrated while
- 00:21:46using the firewall, the problem is that
- 00:21:48if you allow the app to transmit
- 00:21:50eventually, there's always the risk that
- 00:21:52the data has been accumulated and sent
- 00:21:55in batch. So, it's okay to use these,
- 00:21:59but they have limitations.
- 00:22:02Summary.
- 00:22:05In summary, although there are many
- 00:22:08risky apps, you can control them so they
- 00:22:10stay within their lane, but as a matter
- 00:22:13of habit, I would recommend that you
- 00:22:14install as few apps as possible. And if
- 00:22:18you're not using an app, then delete it.
- 00:22:20And be careful about login apps to
- 00:22:23Google or Facebook.
- 00:22:25On a privacy focused OS, I really
- 00:22:27wouldn't worry about the system apps.
- 00:22:30Those developers will have already
- 00:22:32curated what can be found there. The
- 00:22:35reality is that the biggest threats have
- 00:22:37always been more inside Google and Apple
- 00:22:40itself. Google, for example,
- 00:22:42deliberately collects constant location
- 00:22:44and other telemetry, and you cannot stop
- 00:22:46it with permissions. They store it in
- 00:22:49what is publicly called the Google
- 00:22:51sensor vault. In case you think I made
- 00:22:53this up, this is really an important
- 00:22:55element. System apps installed by Google
- 00:22:58itself can evade permission
- 00:23:00requirements. They can talk to HQ and
- 00:23:02hidden channels and have encrypted
- 00:23:04traffic. And likely you will see more of
- 00:23:07this with AI companion type apps. But
- 00:23:09Google and Apple successfully limited
- 00:23:12the risk of third-party apps and
- 00:23:15open-source oss are immune from Google
- 00:23:18and Apple's surveillance infrastructure.
- 00:23:20So the risk left is often just at the
- 00:23:24level of permissions. So, that's where
- 00:23:26you need to raise your awareness,
- 00:23:28granting permissions and making sure no
- 00:23:30one has installed a Rogue app on your
- 00:23:33device.
- 00:23:37Folks, while other channels sustain
- 00:23:39themselves via sponsorships, we are
- 00:23:42actively sustained solely by this
- 00:23:44community. Thank you to those who
- 00:23:46provide financial support directly to us
- 00:23:49through Patreon, locals, and YouTube
- 00:23:51memberships. We have also taken the
- 00:23:53approach of actually creating an
- 00:23:55organization you can trust by creating
- 00:23:58products that support your goal and ours
- 00:24:00of achieving privacy and offering it
- 00:24:03with the best possible service at a
- 00:24:05reasonable price. And this is how we
- 00:24:07chose to sustain this channel. For those
- 00:24:10interested in the BRA 3 project that is
- 00:24:13handled by the site bratec.net net and
- 00:24:16you can see the current status of the
- 00:24:18project there which currently started
- 00:24:20shipping. We have other products that
- 00:24:23you will find on our community area on
- 00:24:26Braxme. There are over 120,000 users
- 00:24:29that are part of our community that
- 00:24:32discuss security and privacy issues in a
- 00:24:35safe environment. Many of you believe in
- 00:24:37us and so this community is growing.
- 00:24:39Some of you have been involved for more
- 00:24:41than 10 years. In our store, you will
- 00:24:44find products like Pixel phones, Brax
- 00:24:47virtual phone, Bra, and ViceVPN. These
- 00:24:50are an essential base to build your
- 00:24:52personal privacy and of course support
- 00:24:54the creation of content on this channel.
- 00:24:57Thank you for watching and see you next
- 00:24:59time.
- privacy
- apps
- third-party
- permissions
- FDroid
- location tracking
- Meta
- security
- open-source