Discussion about this post

User's avatar
Ann Glover's avatar

Urgh. Very bleak, VST. But accurate. Cell phone use is so ubiquitous now, that there seems almost no way out. I would love to aim for your fourth mitigation measure but know, at best, maybe I will only ultimately achieve it in part (which defeats the object). Point 6 seems intriguing - I would hope that some smart and savvy programmers are working on unhackable stuff, but we would have to have a way of knowing if it's to be trusted or not. And also, it requires one to become quite savvy, oneself. Presumably one would have to uninstall corrupted stuff and reinstall incorruptible stuff, etc. So it would become a thing for nerds and not just your everyday IT-compromised paeon. I was interested that you said things are infiltrated at hardware level already. How is that? Also, I heard that people make use of Faraday bags. Is there anything to that? Maybe people will end up resorting to using two devices. One for their innocuous everyday unavoidable stuff like banking and using damned OTPs. And the other, hopefully anonymised, for doing the stuff that reveals their personalities and what they are looking at, saying, and asking.

Expand full comment
1 more comment...

No posts