loader from loading.io

The FBI Weaponized Google Pixel Phones!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 07/20/2021

Google FLoC, AI Gemini, and Election Integrity: Protecting Digital Democracy show art Google FLoC, AI Gemini, and Election Integrity: Protecting Digital Democracy

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Welcome to today's episode where we dive into the rapidly evolving world of technology and its impact on privacy, history, democracy, and consumer behavior. Join us as we explore the implications of Google FLoC cookies on online privacy, the dangers posed by AI Gemini in altering historical narratives, the role of technology in ensuring election integrity, and the influence of platforms like Temu on the online shopping experience. Google FLoC Cookies: Understand how Google's FLoC technology is reshaping online privacy and targeted advertising. Dangers of AI Gemini Changing History: Discover...

info_outline
Solar Storm Apocalypse? Myth or Reality? Protect Your Grid (and Life) show art Solar Storm Apocalypse? Myth or Reality? Protect Your Grid (and Life)

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever considered the impact of a powerful solar storm or an unexpected Electromagnetic Pulse (EMP) on our way of life? This article dives deep into the resilience of our electric grid in the face of these potential threats, exploring the concerning "what ifs." Solar Flares and EMPs: Disrupting Our Connected World Solar Flares: These are massive eruptions of energy from the sun's surface. A powerful enough solar flare can induce electrical currents in our power grids, potentially causing widespread blackouts and damage to transformers. Electromagnetic Pulses (EMPs): These are bursts of...

info_outline
eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? 📧 Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. 🛡️ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. 📥 Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! 🎩💻 Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! 🍪🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. 🌐🔍 Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
 
More Episodes

The FBI Weaponized Google Pixel 4a Phones!

If you look into buying a used Google Pixel 2a, I've got some news for you. The FBI has been very busy, and they've conned the con man. I love this story.  The FBI has been trying to track bad guys for a very long time, and there've been several ways they've done it.

We know obviously about phone taps. We've seen those before the old days. I don't know if you've ever been to one of the original. Telephone switching stations were all not even original, but the types they had in the late sixties and early seventies. I remember going to see one, and all of these switches were going.

[00:00:43] People were dialing the phones and everything. It was just so cool. And back then, to trace a phone call, what they had to do is find the original. Sore. So they would go to that row, that column, that exact little unit that was hooked up directly to your phone. And then they would see, okay, this is in position this, and then go to that next switch.

[00:01:08] Okay. Position that next switch, position that, and go all the way through. That's the really older days, not the old days where you had somebody that was at a switchboard doing it. Nowadays, of course, it's all done by computers. The telephone company turns your voice into a digital signal, and it's usually done right in your local neighborhood.

[00:01:29] It isn't even done at the central office anymore. So by the time your voice is outside the central office, it's digital. It's hauled on nowadays, even partially an internet protocol. Network. They used to use different protocols back in the day. And so, it makes it quite easy for them to tap your line. Now, of course, there's the legal side of this.

[00:01:53] Do they have the legal right to do it to the need a court order or what kind of a court order? Do they need it, right? All of that stuff. But that is the side. It's effortless to find out where calls went, where they came from, and to listen in because it's just digital—Data's completely copyable with absolutely no particular problems at all in copying it.

[00:02:17]Last month. The FBI and the Australian federal police acknowledged that they had indeed been working on this encrypted device. And the company was called a nom, which is a fake company and a nom sole. 12,000 smartphones to criminal syndicates around the world. That's the wording that the police used.

[00:02:45] So these were being sold as secure devices. They did things like they removed the cell leader, modem functionality they'd changed the boot ROMs. They removed the GPS. So the idea was, Hey, you missed your badge. You can use one of our Anom phones, and it's using a special version of the Android operating system, and you can send messages back and forth.

[00:03:10] It's a completely secure messenger service with end-to-end encryption, right? Like we're always being promised. And so what happened is bad guys started referring. Bad guys to this, right? Cause if they wanted to talk to the other guy, they both needed these Anom phones. Otherwise, they wouldn't be able to talk to each other.

[00:03:31]And so they were recommending the use of these phones to their friends that were in the illegal businesses as well. So this I'm just chocolate is so great. So the FBI weaponized. Android phones, at least this particular model of it. And there's a whole community in the Android world. It doesn't exist in the iPhone world because this is much harder to do in the iPhone world, but they call themselves the model.

[00:04:03] Community. And so they'll get a phone from some vendor. They'll make some changes to it that led to maybe change networks or do other fancy things. So they, after the FBI, used some of this technology. The modding community and did some just amazing things with this custom rom. Now you're going to love this part.

[00:04:24] Okay. So when you boot this phone up, this is according to ARS Technica. The phone will have, of course, a little boot screen and. The highest custom from here is the boot loader and other things, but it showed an arcane, oh, S boot screen that's the name, arcane O S and every place, the normal Android distribution that comes from Google with the.

[00:04:52] B I's arcane. Oh, west green. It's just phenomenal that these guys would do this and would fall for it. So the FBI told the criminals, Hey alleged criminals, Hey, these are secure devices, the really focused on security, and there is a pin scrambling fee. What would happen if on your phone?

[00:05:14]You might enter pin some phones, you might use a fingerprint, or he might use a face ID. This was a security feature. And what happened is normally you've got what, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0. And you type in your pin, and off you go, what this did, is it scrambled it? So it might be nine too.

[00:05:34]Just the scramble of the digits up so that when you enter your pin, you're not always touching the screen in the same place so that people could not guess your code from the fingerprints you're leaving behind. Now, this is also interesting. It, this is a great way to do it. If you're doing it for real, having to run an anonymous phone, they had two different interfaces on the phone, and a different one would pop up depending on. Pin you typed into the lock screen. So the first pin would show a bunch of non-functional apps that are pretty popular in the app store, like Tinder, Instagram, Facebook, Netflix, candy crush games.

[00:06:18] So if somebody is checking out your phone, forcing you to unlock it, they're not going to find budge. And by the way, none of those things work. But. If I had designed it, I would have made them so that they would work. So you can fool some of us by trying to rob us and steal your phone.

[00:06:32] The second pin you could enter tells you chose your pins, but it was supposed to be the secure section. She didn't have the phone. So it had a clock, a calculator, and the settings. But the calculator app actually opened a login screen to a nom as an anonymous. And that, again, the bad guys are told all that's a secure, encrypted way to chat.

[00:06:57]This is just amazing. So they will do use that. So they go into the calculator app and now allowed them to chat with their friends. But what they did not realize. Is, it was actually sending all of the messages also un-encrypted to the FBI. Okay, absolutely amazing. Amazing. So now, some of these bad guys are selling their phones online.

[00:07:28] I remember I warned you at the very beginning. If you're going to buy a pixel for a, you want to listen to this first because the bad guys are selling. Their phones are online. And so, several people have been trying to figure it out—some posts on Reddit and elsewhere. You guys know how to deal with this arcane.

[00:07:48] S, how can I reset this? What should I do? Okay. A lot of confused people. How do I fix this thing? You're not going to be able to fix it. Okay. By the way, this thing I think is really cool because the guy who he bought it legit guy bought it use. You said the installed operating system is arcane O S 10.

[00:08:06] The system updater says that Archana, YC 11 is available for download, but I don't want to do it in case it makes something even harder to fix. So maybe the FBI is bad. At sending out updates and fixes, most of the Google Android vendors are out there, and I'm just laughing all the way through here.

[00:08:27]So, there are some things that a tech-savvy user should know. So I want you guys to pay attention to this, particularly if you're using an Android device. So the first thing is when you start up a newer Android phone when it's made in the last few years, The first thing that happened is that Google runs something called verified boot, which makes sure the operating system has not been modified.

[00:08:58] So, the operating system from the device manufacturer will be signed using a cryptographically secured. What was happening here is these devices were failing verified boot, of course, because the FBI had modified the boot ROMs. And if your device fails, verified boot, your Android device either could be an unlocked boot loader or a relaunch boot loader with tampered software.

[00:09:27] It's going to show a message. And, in this case, the FDA FBI devices have a message that says your device is loading a different operating system, complete with their yellow exclamation point icon and a link for Google support pages. Phenomenal. And by the way, the article I'm sending this out in my newsletter, but it says.

[00:09:54] How resistance changes. Google has an order. So it sent them to the legitimate Google support. So there you go. There's a perfect little piece of advice right now. The FBI changed many Android operating systems and tripped out many Android settings that might've revealed something about the fact that it really was a spy device system settings for app storage, and accounts have been removed.

[00:10:23] So pay attention, right? If your machine boots up, the plane's about the bootloader, you've got a problem, and it isn't just Android. Obviously, Apple will do that. The newer versions of windows are starting to do that as well with TPMS, and windows 11 is really going to bring a lot of that to the forum.

[00:10:44] Hey, you're listening to Craig Peterson, and you can find me online. Craig peterson.com. Check it out and stick around.