Welcome to Expose The Dark!

13 May, 2025

GrapheneOS

...

It has long been clear to the awake Dutch person that the QR code has not yet disappeared from the scene. Just as the reins are occasionally loosened with a horse, we see the same pattern in the roll-out of the digital control system. Each time two steps are taken forward, one is taken back.

“Know the outcome and you'll see the journey”, is one of the famous quotes from conspiracy researcher David Icke. When you see where we are being taken, it becomes very simple to recognize the intermediate steps towards that goal.

What exactly is the end goal then? The QR code in combination with the European Digital Identity (EDI) will soon become the central benchmark to which everything will be linked. This will also be your ID, your driver's license, your medical file and your vaccination certificate. A huge disaster for your privacy, but the ultimate wet dream of a government that strives for totalitarian control.

In addition, just about all your data will be linked to this. So what data should you think about? Think of your insurance, credit details, tax returns, groceries, travel data, digital currency, basic income, CO2 budget and perhaps most importantly: your internet behavior.

Your internet behavior can perfectly tell whether you have been a good citizen!

Your internet behavior and social credit in China

A social credit system has been active in China since 2014. Every citizen is given a score based on his/her behaviour. Everyone's score is publicly known, as are the consequences of a too low score. Undesirable behavior according to the Chinese communist government can lead to being banned from a job, a house, a loan, or from public transport and air traffic.

In China, your internet behavior is also very important for your score. Are you publicly against lockdowns? Bad news for your score. Do you often read articles that are critical of government policy? Even then your score will go down.

In the West we have already seen how chat applications like Whatsapp are forced to remove the encryption. This means that it becomes very easy for outsiders to analyze the content of the messages. To what extent can this data be used against you in the near future?

Cut your connections with Big Tech

Something I strongly emphasized in my Café Weltschmerz interview is the fusion of the public and private sectors. It is not so much the governments that have rolled out the infrastructure themselves to be able to spy and control us. No, they do this through Big Tech companies like Google, Facebook and Microsoft.

This in itself is great news! It means that we can escape a large part of the consequences of this system by simply using different technology.

According to our philosophy, this is technology that supports human rights and values such as privacy, security and freedom of expression. Open-source software and decentralization of consensus are an absolute must.

The Snowden Smartphone

Based on this philosophy, Android-Privacy.com has created the Snowden Smartphone: the favorite phone of NSA whistleblower Edward Snowden. The phone runs on a Google-free version of Android, so all your favorite applications are available!

Of course, Android-Privacy.com advises against using certain applications, because of the protection of your privacy. For that reason, when you purchase the Snowden Smartphone, you also get access to their Privacy Platform, where they teach you everything about replacements for Big Tech applications such as Whatsapp, Facebook, Twitter, etc.

Understandably, you can't move to alternatives right away, so we'll also teach you how to use these applications in a privacy-friendly way. In the tweet below you can see how Edward Snowden has set up his telephone.

The phone is equipped with the most secure and privacy-friendly operating system in the world: GrapheneOS. In addition, all traffic is sent via TOR, so that your IP is hidden at all times. This is exactly the phone that you can order at Android-Privacy.com.

 

The phone also protects your privacy and your security with functionalities such as:

  • No IP leaks at your ISP: everything via TOR
    Your IP address can be traced back to your front door. For that reason, all traffic on the phone is routed through the TOR network. This ensures that your internet service provider cannot analyze your internet behaviour.
  • Camera and microphone software kill switches
    Most Android phones listen in on your conversations all day long. With the Snowden Smartphone, you switch off your microphone and camera across the entire device when you're not using it.
  • Isolated environment for privacy-damaging apps like Whatsapp
    The Snowden Smartphone comes with an isolated environment where you can place privacy-damaging apps. These apps cannot access your phone's apps, photos, contacts, and other data. In addition, you can completely disable this environment when you are not using the apps.
  • No Google login and therefore no Google telemetry
    With the Snowden Smartphone you never have to log in with a (Google) account. Google uses your login to link all your data (Google docs, Youtube, Google search etc.) together. With the Snowden Smartphone, this is a thing of the past.
  • No personal identifier leaks (fingerprint or IMEI)
    All mobile devices and browsers have a unique identifier that allows them to be identified. The Snowden Smartphone will never leak these identifiers to third parties.
  • No 24/7 location tracking
    With the permission manager you can set which application has access to your location. Obviously, Big Tech companies like Google don't have access.
  • No Corona contact tracing beacons
    In the Corona time, various contact tracing applications have been rolled out on iPhone and Android phones. This phone is completely free of that.
  • No Bluetooth probs leaks, switch off your bluetooth by default
    . Always having your Bluetooth on gives a lot of privacy problems. With this phone, you therefore automatically switch off your Bluetooth when you do not use it, for example, for 10 minutes.

Source: android-privacy.com

Back




Leave a comment




Search

Sponsor
Social Media
  • twitter Active
  • facebook Active
  • youtube Taken Down
  • bitchute Active
  • rss Active
Picture Gallery Coming Soon