Essential Privacy: Mobile Phone & SIM Cards

Sdílet
Vložit
  • čas přidán 19. 06. 2024
  • How much can your mobile phone provider track about you? What are the dangers of SIM swapping and is it better to use an eSIM? Listen to get answers to the essential privacy and security questions we all have about our mobile devices. Learn more about Efani: efani.com/allthingssecured
    🔹🔹Services & Products Mentioned🔹🔹
    ✅ Efani (Secure SIM service): efani.com/allthingssecured
    ✅ Faraday Bag: geni.us/faraday-bag
    ✅ Phone/Computer Camera Blockers: geni.us/nanobloc-covers
    ✅ Privacy-focused VPN: www.allthingssecured.com/try/...
    *These links are affiliate links, which means that if you decide to purchase one of these products, we will receive a commission. Thank you for your support!
    🔹🔹More great videos on mobile privacy🔹🔹
    ✅ How to check if your phone has been hacked: • Is Your iPhone HACKED?...
    ✅ What is SIM Swapping? • SIM Swapping EXPLAINED...
    ✅ Critical iPhone Security settings: • 8 CRITICAL iPhone Secu...
    *********************
    Video Timestamps
    *********************
    0:00 - Introduction with Mark Kreitzman
    1:25 - What Does Your Mobile Provider Know About You?
    5:40 - Privacy when Using Phones Internationally
    10:15 - eSIM vs Physical SIM cards: Which is more Secure?
    14:22 - Risks of QR codes
    15:46 - New Threats to Mobile Phones
    24:04 - Can Your Phone be Cloned?
    30:42 - Quick Tips to Secure Your Mobile Device
    32:50 - How does Efani build privacy & security?
    40:44 - Being Private & Secure on Social Media apps
    46:36 - Using Email Aliases for Security
    49:05 - Is it possible to have a phone camera spied on?
    52:42 - Are mobile phone apps secure to use?
    57:03 - Is a Faraday bag worth buying?
    1:00:40 - Best way to send sensitive documents via mobile?
    1:03:45 - VPNs with a good reputation
    1:06:13 - Does a Private OS like Graphene offer more protection?
    1:11:29 - Should we cover our phone cameras for privacy?
    1:13:45 - Security: Apple vs Android
    1:17:01 - Closing Remarks with Mark Kreitzman
    1:19:49 - Closing remarks with Josh
    *********************
    Josh from All Things Secured and Mark from Efani came together on this live webinar to discuss mobile privacy and security. What are the steps you need to take to ensure that your mobile provider and all the apps you use can't track everything you do? And could you benefit from the added SIM swap protections that a private SIM service like Efani provides?
    Learn more about Efani here: efani.com/allthingssecured
    #mobilesecurity #cybersecurity #privacy
  • Zábava

Komentáře • 104

  • @ua1514
    @ua1514 Před 11 měsíci +32

    Please add timestamps.

  • @danielkroft
    @danielkroft Před 11 měsíci +9

    I would love to see more of these! Its great to put a face to a service that I am potentially trusting with my privacy.

  • @ipaemer2604
    @ipaemer2604 Před 11 měsíci +6

    My favorite channel! I love your videos, very informative and very helpful. Keep it up! Respects from Albania!

  • @lisalinnae9844
    @lisalinnae9844 Před 4 měsíci +1

    Love This !!! Explains a lot: Thank you so much for this information. Lisa

  • @cherylliz99
    @cherylliz99 Před 4 měsíci +4

    This information is alarming!!!

  • @robtihanyi1155
    @robtihanyi1155 Před 11 měsíci +1

    Great podcast Josh... bonus points for asking excellent questions! What you should have asked him was when are you guys coming to Australia?

  • @ameensams
    @ameensams Před 11 měsíci +2

    You know those instances where you accidentally stumbled on a video and you go boom! this is awesome info I wouldn't mind paying for. Thanks, man, hackers are getting smarter and we need to up our game too. Lazy says to use the same password for everything, sense "you" say no.

  • @SusanSian
    @SusanSian Před 24 dny

    I'm very grateful for this video

  • @RebeccaBellaPugsMomOfficial
    @RebeccaBellaPugsMomOfficial Před 5 měsíci +3

    It’s 1:06 am central. Ok I am wondering? For example…. You said that a MZ could basically act as the WiFi router clone and then when I got to a place that my phone would auto connect, my phone would actually connect to the clone router. If I disable auto connect and then get home or to my parents house and connect manually to the same password as before? How does my device not connect to the potential clone router regardless?

  • @RebeccaHallBoelKe
    @RebeccaHallBoelKe Před 8 měsíci +1

    Wow so informative.

  • @privatenosey
    @privatenosey Před 9 dny

    I down loaded a QR reader and it wiped out apps on my cell phone and stuff on my PC I was not even using. Samsung got most of my APPs back on my phone. They said it wad the QR scanner I used. I am getting into securing my phone and Pcs now. That's why I am listening to u.

  • @ElaineGarcia-uo8qj
    @ElaineGarcia-uo8qj Před 22 dny

    I have a smartphone without a sim card 💳. I want it that way (no phone bills haha)
    What bothers me is that advertisers "seem" to know, because 90% of my ads are for cell phone providers ( sheesh some ive never even heard of)

  • @Ivan989v
    @Ivan989v Před 11 měsíci +2

    Josh, could you please follow up with Mark on how the network operator knows location of a subscriber ?
    What I heard first minutes down into this conversation goes completely against what I know about mobile technology.
    2:53
    From what I know:
    1. There is no way for network operator to know the exact location of a subscriber (via GPS data on subscriber’s phone), unless subscriber installed an app released by this operator, or operator buys data from 3rd parties.
    2. Network operator can always get approximate location of the subscriber via triangulation method using location of cell towers to which subscriber is connected. They use IMEI of the device to uniquely identify a subscriber.
    Could someone with knowledge please comment on this?

  • @u2fkeys665
    @u2fkeys665 Před 11 měsíci +7

    What is Efani doing about sting rays though? That's the most dangerous threat I'm my opinion.

    • @AllThingsSecured
      @AllThingsSecured  Před 11 měsíci +1

      I’m not sure what can be done about stingrays. The big thing with Efani is that they hide your data so that mobile companies can’t track your phone against your info.

    • @independent-ts6ys
      @independent-ts6ys Před 10 dny

      Stingrays, or IMSI CATCHERS, are now smalll devices that look like a computer notebook. Google IMSI CATCHERS.
      And ANRITSU.

  • @freddylosangeles1378
    @freddylosangeles1378 Před 6 měsíci

    ..good tips..

  • @WatchmanPrivacy
    @WatchmanPrivacy Před 11 měsíci

    Love to see this.

  • @stanhyatt4843
    @stanhyatt4843 Před 11 měsíci +1

    excellent.....thanks!

  • @Whtimiswhtugt
    @Whtimiswhtugt Před 6 měsíci

    Hi Josh 🙋‍♀️

  • @Ivan989v
    @Ivan989v Před 11 měsíci

    Could you please explain on how tracking location through a fake website and knowing the IP of the phone works (not a single time when the website is open, but continuously)? 39:13
    Is it via buying data from 3rd parties, or some other way? Please elaborate ?

  • @Ivan989v
    @Ivan989v Před 11 měsíci +1

    I can see that removing automatic connection to known WiFi network could help only if the network doesn’t require a password (which one should not do in the first place)
    1. How can someone clone your WiFi network if it has a WPA2 or better password protection ?
    2. How would it help to connect to WiFi manually instead of automatically?

    • @bassmaiasa1312
      @bassmaiasa1312 Před 4 měsíci

      They don't clone the network, they just copy the SSID. He said they knock out the legitimate wifi with a DDOS attack so a device can't find it. The device then auto-connects to the fake SSID. To the device, it just looks like the legitimate network removed the password requirement.

  • @Jellypeppa72
    @Jellypeppa72 Před 2 měsíci +1

    Great info for a lay person like me😊

    • @AllThingsSecured
      @AllThingsSecured  Před 2 měsíci

      Great! Glad it was helpful.

    • @Jellypeppa72
      @Jellypeppa72 Před 2 měsíci

      @@AllThingsSecured my phone has been hacked 5 times 5 different phones, from that they got into my laptop, my bank account, credit card, from that they hacked my friends and family

  • @MaxRuso
    @MaxRuso Před 8 měsíci +1

    I like how he uses the word scared while you guys are streaming on CZcams and people are watching it on their phones are you for real

  • @likebot.
    @likebot. Před 11 měsíci +3

    One thing Mark mentioned is that you need an e-mail address to set up a phone. I take it that he means the computer aspect of the phone. Surely you can have a mobile smartphone with a phone number and no e-mail address associated? It's been so long since I've use a mobile that I have yet to even see a SIM card. I've not used a mobile since about 13 or 14 years ago so I don't even know if the phone part of it is even an APP .

    • @AllThingsSecured
      @AllThingsSecured  Před 11 měsíci +2

      Most mobile providers I know require an email address for communication.

    • @ElaineGarcia-uo8qj
      @ElaineGarcia-uo8qj Před 22 dny

      The email is required for the computing aspect of the phone
      The phone is an app (on a smartphone)
      And you can go without a sim card 💳 if you just use the computing aspect of the phone. In this sense you don't need a provider just a device
      Source: using a smartphone without sim (or service provider) to reply right now

  • @sharlenejackson4028
    @sharlenejackson4028 Před měsícem

    Is an authentication app safe to use if in the description it says it can act as FIDO ASM, access authentication devices and create & delete FIDO registrations on behalf of other apps??

  • @donnettelowd1926
    @donnettelowd1926 Před 4 měsíci

    Is Trend VPN trustworthy?

  • @user-oq8gz9gi9h
    @user-oq8gz9gi9h Před 3 měsíci

    Interesting

  • @sandinana9665
    @sandinana9665 Před 7 měsíci

    When a cell tower pings Efani’s SIM card, does it ping as Efani, or as my name? Also, what shows on Caller ID?

    • @edwardjones6777
      @edwardjones6777 Před 4 měsíci +1

      An efani corporate account shows. With none of your personal information. I saw that in another video

  • @bonniemiller1819
    @bonniemiller1819 Před 8 měsíci

    Would you change your password(s) of your were hacked or victim of fraud. How to secure your email today

  • @unsicheresgangbild
    @unsicheresgangbild Před 11 měsíci +1

    What are your thoughts on the nothing phone?

    • @AllThingsSecured
      @AllThingsSecured  Před 11 měsíci +1

      Lots of hype so far. I’m reserving judgement right now.

  • @glendaspeakstotheheart
    @glendaspeakstotheheart Před 3 měsíci +1

    How do I know if my data is really breeched when I get a message i've been compromised. And should I go to Google for it to be corrected as suggested ?

    • @monkeyseemonkeydo432
      @monkeyseemonkeydo432 Před 2 měsíci

      Log into your Google account…change password to a more secure password …
      …(youtube search secure passwords)
      It won’t harm to look at your security settings in your google account…
      just slowly go through at your own pace and familiarise yourself with the layout and options ..don’t change anything yet until you know for sure what your doing
      But why would they send a message saying you have been breached…and not just secure the breach
      There’s no harm in contacting genuine google support…
      but don’t click on links in messages or emails or call numbers given in text messages or emails

  • @JoanMcCants-cs9tq
    @JoanMcCants-cs9tq Před měsícem +1

    Hey, I AM NOT GOING TO BE TAKEN FOR GRANTED ALL THE CONSPIRACY IS NOT RIGHT 🤔

  • @SPLASHING-SILVER
    @SPLASHING-SILVER Před 2 měsíci +2

    If you do reset and back it up doesn't the virus get downloaded too

  • @SPLASHING-SILVER
    @SPLASHING-SILVER Před 2 měsíci

    How to stop phone from doing updates when you say don't and or stop changing your settings?? Everyday or few days I have to reset phone to where it was

  • @snipedeedillygaf4973
    @snipedeedillygaf4973 Před 7 měsíci

    What happens if u sim pin lock but u already been sim swapped my Verizon phone unlocked after 60!days but ain’t paid of for 30 more months now weird atuff is happening like its connecting to my other phones my other. Air tags find my phone getting Verizon apple text messages. Like crazy support don’t really care. It seems it’s not really them privacy report has a lot of location and contacts and. Also fake Verizon support

  • @zannemairiwoods528
    @zannemairiwoods528 Před 8 měsíci

    What about face I D as an unlock feature ?

    • @Keto-Cheato
      @Keto-Cheato Před 16 dny

      Idk but im pretty sure its No good. Phone software stores it. It's hackable.

  • @joeytranchina8839
    @joeytranchina8839 Před měsícem

    For the record the data collected in "2000 Mules" did not prove what the fraudster who produced the film claimed to prove.
    That's why i call that film "2000 Jackasses." But, YES, that location data can be gathered.

  • @user-wx3jx8lo2d
    @user-wx3jx8lo2d Před 6 měsíci

    Question. How does someone hack your debit card multiple times even though you have a new card, due to the hacking, with new card numbers?

    • @monkeyseemonkeydo432
      @monkeyseemonkeydo432 Před 2 měsíci

      Answer
      Depends…
      ….do you use your DEBIT card in shops and for online purchases
      If so…there is the vulnerability

  • @MaxRuso
    @MaxRuso Před 8 měsíci

    They can also knock on your door

  • @Alonzo_4
    @Alonzo_4 Před 5 dny

    To prevent sim swapping my provider wants me to go to their fysical store and verify my ID

  • @zannemairiwoods528
    @zannemairiwoods528 Před 8 měsíci

    While on CZcams I watched Fox News &
    in the middle of program ,
    a Chinese person broke in
    & started coloring a picture which lasted through the rest of program . This happened
    on all Fox News programs
    that I tried to watched !
    Was that a cyber attack
    from my Phone or a targeted News Network
    Cyber interference ?

    • @monkeyseemonkeydo432
      @monkeyseemonkeydo432 Před 2 měsíci +1

      I was watching regular television
      it was the news and they were covering stuff to do with 9/11 and the pentagon
      A pentagram came on to the screen of the tv
      That was definitely an attack on the broadcast..not my tv

  • @snipedeedillygaf4973
    @snipedeedillygaf4973 Před 7 měsíci

    *#21#. Error unknown.

  • @SusanSian
    @SusanSian Před 24 dny

    This is breathing I believe that they know where that flight from Malaysia is that because there's no way with all that that they don't know where one of those cell phones is and since they won't tell it it must be very bad where that plane is

  • @gloriafarmer6826
    @gloriafarmer6826 Před měsícem

    Data breaches are out ofc
    Control! Not good at all!

  • @cesarnater1974
    @cesarnater1974 Před 11 měsíci

    good day hope all is well

  • @rjain1993
    @rjain1993 Před 11 měsíci

    👍🏻

  • @bassmaiasa1312
    @bassmaiasa1312 Před 4 měsíci

    I do have a separate e-mail for financial services. But that doesn't work for Paypal. When you login to Paypal to pay on a website, the website captures your Paypal email. The website may replace your registered email with your Paypal address or contact you at your Paypal email. So you can't isolate your Paypal email from floating all over the web. And yes, that is the email for Paypal password reset.
    Why doesn't Paypal shield the login from the vendor site? Why is the vendor stealing my Paypal login?
    It's another example where tech companies are as much of a security threat as cyber-criminals.

  • @madbalkanrabbit898
    @madbalkanrabbit898 Před 11 měsíci

    What about rootkits for mobile phone?

  • @ikust007
    @ikust007 Před 11 měsíci

    Super and 🎉

  • @asimmohammed3683
    @asimmohammed3683 Před 11 měsíci

    I heard apple never share any of data even if FBI asked? Is it true?

    • @AllThingsSecured
      @AllThingsSecured  Před 11 měsíci

      Mostly, yes. But I recommend you enable Advanced Data Protection to encrypt any data on the cloud.

  • @Mountainmom59
    @Mountainmom59 Před 11 měsíci

    Arkansas/ Young man maybe you should help AT&T again,because i have been hacked and blocked so bad ,that my cell phone can not call 911, i havd got only 1 weather warning in the last 3 years . Domain abuse , as well as a multitude of problems . No help it seems

  • @joehintz1785
    @joehintz1785 Před 11 měsíci

    Cape Cod MA

  • @MaxRuso
    @MaxRuso Před 8 měsíci

    The guy is freaking out about a phone suggesting where the nearest pizza is

  • @snipedeedillygaf4973
    @snipedeedillygaf4973 Před 7 měsíci

    My phone reset on day 60

  • @kevinarnold213
    @kevinarnold213 Před měsícem

    My thoughts are to throw away the phone number, is that a way to keep assholes off my personal information?

  • @user-sx5sc7iw5m
    @user-sx5sc7iw5m Před 11 měsíci

    Robert... Virginia

  • @johnnybaber1804
    @johnnybaber1804 Před měsícem

    I've been listed as a developer and I'm not sure what that means but it sounds like I get all kinds of information that's really juicy about what I was going on with all this stuff on the internet and what can happen and how it's all shared and I don't know how to get out of it I keep it I don't know how to stop it it knows everything my sleeping habits my medications everything I've done everything you're not supposed to do with the phone and so it could be used against me sounds like I'm not sure but yeah this is scary I get screenshots millions of screenshots roll up my sleeves and get ready to get busy to try to fix it but I can't do it you take it you know artificial intelligence to fix what I think is on my system I don't know what all this stuff is

  • @Mountainmom59
    @Mountainmom59 Před 11 měsíci

    Sims over riden by an e-sims and fi app . Yes Clone is and has happen . I trust Nothing any more .

  • @4merLawman
    @4merLawman Před 11 měsíci

    Bob Cape May NJ

  • @user-tv4ki7yc1k
    @user-tv4ki7yc1k Před 2 měsíci

    Oh do we. I know who this is. Typical comment, narc. We need an updated system so from now on too bad so sad. Wow.😊

  • @joannthomases9304
    @joannthomases9304 Před 3 měsíci

    We need another system..This is too much crap..sorry, but it now is.

  • @RawTruth101
    @RawTruth101 Před 2 měsíci

    👍🫣

  • @Sabuton88
    @Sabuton88 Před 4 dny

    he affiliated comtent what you end up clicking!! don't buy this shit

  • @extrememike
    @extrememike Před 5 měsíci +1

    29:00 I think he is talking about Mr Robot series with @davidbonbal and OTW (Occupy the Web)