Can We Really go “Ghost” w/ Our Devices?
By Sean Patrick Tario
Every now and again someone will reach out to our team attempting to discredit our “Ghost” products and services. The claims are always related to one, some, or all of the following:
…but you use Google Pixel phones! GOOGLE made the phones!…but it’s impossible to not be tracked by the mobile service providers!
…but the hardware provides back door access to (Google, China, intelligence agencies, hackers, etc.)
I’d like to set the record straight here so I don’t have to keep having the same conversations over and over again. The “…but Google” Argument We believe Google is evil. We believe their “DO NO EVIL” slogan from the start was a joke. We know the majority of their revenues during their first few years (and large % even today) were coming from the online porn industry. We know their intentions from the onset have always been to become a primary tool for global surveillance and, to this end, we know they were initially funded via various DoD projects and have always been closely connected to our intelligence agencies. This is all true. Follow the money. Look at the ownership. Learn the ethos of the ownership. Thus, it makes sense that some people may initially think that by using the Google Pixel phone we are simply supporting Google or allowing Google to track you. This, however, is not the case. Here’s why… Refurbished Phones No $ goes to Google when we buy, or you buy, one of our devices. This is because we believe the planned obsolescence economy is a fraud and should be stopped. The phones we are selling are refurbished “mint” or “near mint” condition Google Pixel devices bought from resellers across the country. With nearly 15 billion mobile phones on the planet and a population of only 8 billion, there are an almost infinite supply of used “near mint” condition phones that work extremely well. There is absolutely NO NEED to manufacture new devices. New devices require the mining of more precious metals out of the earth using child labor and what we know are horrific conditions creating massive waste and pollution in countries such as China and Africa. All those who sell, or are working on developing, NEW “secure” phones (such as Gabb, Unplugged, Elon Musk’s proposed “Telsla Pi” phone or even the new phone Gregg Phillips is purported to be working on) are thus creating more DEMAND for the manufacturing of the required minerals and materials harvested by the exploitation of labor overseas. They are also all using closed source operating systems, which is something we fundamentally disagree with for all the reasons I discuss during my live Digital Privacy Bootcamps. Hence, when you’re buying a Ghost Phone or even Ghost Laptop from MARK37, you’re not buying a brand new device. You are buying a refurbished device that we have sourced to ensure functionality and, more importantly, the ability for us to wipe off all Google software that was loaded on the device. This requires finding devices that are “OEM unlocked” which is much different than the “Carrier Unlocked” phones you can find at Best Buy or Walmart. Worth noting, a huge reason why Apple, Google and other phone manufacturers continue to come out with new “upgraded” devices is so they can run more background applications on the phone which are intended to process all your activities and spy on you MORE easily. By adding so much processing power to the device they are making it so that this work load no longer needs to come from their own “cloud” services… saving them money. In addition to creating the demand outlined above when you buy a brand new device, you are also now paying THEM for the privileged to spy on you cheaper than they were before. They sell you the “sizzle” of an upgraded camera or digital personal assistant while they quietly leverage the device to further monetize you and reduce their overhead. Ironically, yes, Google Pixel devices are among the most secure and private phones available. The Google Pixel, with the open source operating system GrapheneOS, provides optimum security and privacy. There are a few open source mobile operating systems such as LineageOS and CalyxOS, however, through our testing we have found GrapheneOS to be the most secure mobile operating system available. Unfortunately, it works specifically and only on Pixel devices at this time. Installation of GrapheneOS on other devices is experimental at best and will likely provide only limited functionality. Google Hardware? Thinking that Pixel phones use “Google Hardware” is also not entirely accurate. It’s like saying “Dell hardware” or “HP hardware”. Dell and HP may be involved in the process of telling the manufactures what specific components they need and why they need them, but it’s not the HP, Dell or Google engineers actually designing and manufacturing the motherboards and components themselves. These components are all commodity with very little variation and choice. The Google Tensor chip in the Pixel 6, 7 and 8 devices (not in the Pixel 5 or prior models) follows the same logic. Did Google build this whole chip in house? No. They participated in the process of the design to ensure the chip was optimized for the device… but they didn’t design/build and write all the logic for the device. Nor were they responsible for manufacturing the devices. To do so requires a technical skill set that currently resides within the chip manufacturers. In theory, we could design our own phone and chip set as well… but it would require us making a substantial volume commitment to one of the OEMs (Original Equipment Manufacturers… aka someone who manufactures and assembles devices) about what we want the look/feel/specs of the device to be. By doing so, we would also only be contributing to the demand for more slave labor to mine more materials to create brand new devices… which we feel are entirely unnecessary. But why the Google Pixel phone? The open source Android operating system is to mobile devices what Linux is to open source operating systems on laptops and desktops. Android is an open source framework. Google takes this open source framework (like a blueprint for a building) and then adds to it all their applications and spyware to make it a CLOSED SOURCE Google Android operating system… or what most people know today as “Droid”. Nearly all mobile operating systems outside the iPhone leverage the open source Android operating system to this extent. The Pixel phone is specifically designed to be optimized to work with the open source operating system Android. When designing the phone, Google was very specific with the manufacturer as to what hardware they wanted to ensure the phone was as fast and compatible as possible with the Android operating system… which their Google Android operating system is based off of. Samsung, LG and all other phones on the market do not have the specific functionality that the Pixel device has, which in large part is what allows the open source GrapheneOS operating system that we install on our “Ghost Phones” to be as secure and private as it is. For more details on exactly what functionality I am referring to above, I recommend digging through the documentation found on the GrapheneOS.org site HERE. The “… but Carriers can always track you” Argument Yes, they can and do constantly monitor location data on each device. This is a byproduct of the technology itself and how voice, text and data services work on the phones. I discuss this topic at length during our Digital Privacy Training Bootcamps, with a focus on how you can mitigate both the information being gathered from the carriers and how useful the information is when it is collected. The simple reality is that if your name and contact information are associated with the phone number you are using with one of the major 3 carriers in the US (AT&T, Verizon, T-Mobile), or one of their wholly owned subsidiaries, you have of course made it very easy for them to know where your specific device is located at any given time. If you are using their voice and text messaging services without encryption (and/or using Google, Apple, Microsoft or Amazon operating systems) you’ve also made it even easier for them to collect and make sense of the information you’re sharing using these services. Logically, this should make perfect sense because they control your phone number and deliver the services. Despite this, what one CAN do to help mitigate the information collected and the usefulness of the data collected is:- Use a MVNO (reseller) that isn’t owned by one of the major carriers. This adds a layer of bureaucracy between you and the Big 3 carriers because MVNOs do not NEED to provide the carriers the contact information or name of that is attached to the phone number being used on their network.
- Use an operating system on your device that isn’t owned/controlled by Google, Apple, Microsoft or Amazon (…because any encrypted applications you may leverage on the device are rendered useless if they control your operating system and can see what you see or hear what you hear on the device!)
- Purchase a data only plan from a MVNO and get a phone number through Burnerapp.com, OpenPhone.com or any related service. This will limit your ability to make calls or send messages when your data connection is out of reach, or when there is no wifi network available, but this is a solid option to prevent the carriers from tracking your calls and messages.
- Keep your “confidential” conversations through encrypted messaging services and only with individuals you know are also using non-Google, Apple, Microsoft or Amazon operating systems.
- Get a new phone # and pre-pay for services with a MVNO that does not require you provide them with any identification. T-Mobile and many T-Mobile resellers allows you to do this, for example. Our experience, however, has been that you must visit one of the local stores in person to purchase the plan and pay for services. You can then either continue to pay at the store in cash or over the phone using a pre-paid debit card.All of the methods above can be leveraged to make it harder for the carriers, or anyone trying to leverage the information gathered from the carriers, to identify YOU specifically to any given phone number of device you may be using.
Leave a Reply
Want to join the discussion?Feel free to contribute!