This phone looks good for being able to order off markets on a mobile sevice. The only problem is that its based off a google platform. Im interested in purchasing one. Think its worth it m8ttys?
Blackphone 2
This phone looks good for being able to order off markets on a mobile sevice. The only problem is that its based off a google platform. Im interested in purchasing one. Think its worth it m8ttys?
[7 Points] sapiophile:
[5 Points] Morvu:
haha, this thing doesnt even encrypt emails itself? 800$ fail
[2 Points] None:
Blackphones are a rip off bud.
[1 Points] forDNMreviews:
While most know that cell phone ordering is poor opsec, what kinds of things can you do to minimize your risk?
I'm about to pick up a burner cellphone for local dealing. If I spent a few extra dollars, I can purchase an Android smartphone instead of the basic flip. I do a lot of business through Sigaint as well and it would be nice to access that email over the phone.
What kind of complications can you run into running a rooted burner Android with OrWall, OrBot, and OrWeb? No link to your identity, spurious Tor connections as its not an phone you use all day, and being an Android you can still install most secure chat and PGP apps.
[1 Points] wombat2combat:
do yourself a favor and use tails on a laptop. it is way cheaper and more secure. not only you have to pay hundreds of dollars to get the phone but there is also a subscription for some messenger/phone call apps from circle which is for communication between two blackphone users IIRC [you can choose if you want to pay the subscription fee for these apps and therefore continue using them after one free year].
[1 Points] None:
what is wrong with a rooted android, open source ROM and the usual TOR app hiding IP address?
[1 Points] noonehear:
Carrying around all of your incriminating evidence sounds like a good idea.
[1 Points] waxhacks:
You are pretty much exposed with that thing.
You don't sound like you've done much of a risk assessment.
You're really no safer on that phone than any other one. They just did the configuration for you. That may be a service that would be worth something if the outcome truly mitigated any risks. It doesn't.
The number of threat vectors increases dramatically with a smartphone. It offers evidentiary proofs as to who, when and where even if the what is encrypted.
My smartphone is a calculated risk. It is a necessary evil and can and will be used against me.
Best thing to do is cycle through burners. It's harder for them to collect much evidence if you change phones often.
Make no mistake, if it has gone so far that LE is after you, your phone can only hurt you. It is not a convenience.
No.
http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone