Privacy-Invading Systems and How to Avoid Them: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

21 April 2026

  • curprev 15:4515:45, 21 April 2026 Jeremy talk contribs 45,392 bytes 0 No edit summary
  • curprev 15:2615:26, 21 April 2026 Jeremy talk contribs 45,392 bytes +43,878 No edit summary
  • curprev 14:0914:09, 21 April 2026 Jeremy talk contribs 1,514 bytes +1,514 Created page with "There are a frightening number of systems that are being used by entities to oppress people. Here are some known systems, what they do, and how you can avoid them. =Mobile Device Interception= ==Stringray== The Stingray is a cell-site simulator (IMSI catcher) that spoofs mobile network towers to intercept your mobile device traffic. =Mobile Device Access= ==Cellebrite (UFED)== =Mobile Device "Forensic" Tools== ==Grayshift (GrayKey)== ==Graphite== Spyware used by gove..."