Privacy Trash Panda

801 posts

Privacy Trash Panda banner
Privacy Trash Panda

Privacy Trash Panda

@TrashcanPrivacy

Digging through trash to protect your treasure

The dump Tham gia Eylül 2025
270 Đang theo dõi33 Người theo dõi
Tweet ghim
Privacy Trash Panda
Privacy Trash Panda@TrashcanPrivacy·
They sell it to ANYONE willing to pay. Governments, telemarketers, advertisers, and shady dark web pages pretending to be legit businesses that clearly aren’t. Your data is $$$ to them. Your privacy is for sale.
IT Guy@T3chFalcon

x.com/i/article/2038…

English
1
7
21
1.3K
Privacy Trash Panda đã retweet
Mysk 🇨🇦🇩🇪
X is launching XChat as a dedicated iOS app on April 17. No ads. No tracking. Fully end-to-end encrypted. But it collects all this data:
Mysk 🇨🇦🇩🇪 tweet media
English
23
17
206
15.3K
Privacy Trash Panda đã retweet
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
IF YOU INSERT A CHARGER OR CABLE INTO YOUR PHONE, YOUR PHONE RECORDS IT. Each time a phone is connected to or disconnected from a charging cable, the system records it. These logs are crucial for investigators because they provide precise timestamps of physical device interaction, helping reconstruct user activity, verify alibis, correlate movements, and establish timelines, making them reliable indicators of handling and behavior during digital forensic investigations. Another key fact: Charging logs can reveal interruptions or unusual patterns for example, frequent disconnects may indicate movement, tampering, or active device use, helping investigators detect inconsistencies in a suspect’s timeline or behavior.
Nana Sei Anyemedu tweet media
English
71
562
3.1K
423.1K
Privacy Trash Panda đã retweet
Good old npzman
Good old npzman@yourfeedofme·
No to Age Verification FOREVER WORLDWIDE No to Age Based Social Media Bans FOREVER WORLDWIDE No to Digital ID FOREVER WORLDWIDE No to CBDC FOREVER WORLDWIDE Yes to the right to use Cash FOREVER WORLDWIDE Yes to the right to Online Anonymity FOREVER WORLDWIDE PASS THIS ON !!
English
16
994
2.1K
15K
Privacy Trash Panda đã retweet
IT Guy
IT Guy@T3chFalcon·
Cell tower triangulation is one of the most overlooked threats in personal OPSEC. It often goes unnoticed because it is completely invisible to the person being tracked. When people think about digital privacy, they usually focus on obvious risks. They might use a VPN, switch to Signal, or cover their webcam. These are sensible steps for some threats. However, they miss one thing: they only protect what happens at the app level. Cell tower data works deeper, beyond anything you can change in your phone’s settings. (CHECK THE QUOTED TWEET) The risk does not come from software you installed but from how cellular networks are built. For your phone to get calls, messages, or data, it must always announce itself to the nearest tower. This is how the network works. You cannot avoid it and still use the network. It happens whether you use your phone or not. If your phone is on, it is broadcasting. Your carrier keeps a record of every tower your device connects to, with timestamps and signal details. This log is not on your phone. You cannot see, check, or erase it. It is stored by a third party who must hand it over if required by law. In many places, authorities can easily get this data. The risks go beyond law enforcement. Call Detail Records or CDRs, are targeted by SIM swap attackers, dishonest carrier employees, and in some areas, data brokers with unofficial access to carrier systems. Your movement history is not just evidence; it is valuable data many attackers want. If you worry about stalking, corporate spying, harassment, or government surveillance, cell tower data is not just a possible risk. It is a real and ongoing exposure. It is important to understand how this threat works. In crowded cities, towers are close enough that your location can be guessed within a few hundred meters using only passive registration data. No GPS or app permissions are needed, and you do not have to do anything. Someone with your CDRs can map your daily routine, find your home and work, track your usual movements, and spot changes. So what can you actually do to protect yourself? The answer depends on your personal risk level. For most people, the first step is simply being aware that your phone acts as a passive location tracker. If you face higher risks, you need stronger measures. Putting your device in a Faraday bag blocks it from connecting to towers. Turning your phone off works too, but if you always turn it off at the same times, that pattern can also reveal information. Some people use burner phones with no link to their identity, bought with cash, used rarely, and never turned on near their main phone. The most important rule with burner phones is to keep them separate in location, behavior, and routine. If you turn on a burner at home or carry it with your main phone lol.
Nana Sei Anyemedu@RedHatPentester

CELL TOWER TRIANGULATIONS Cell tower artifacts provide a passive yet powerful layer of location intelligence. As a mobile device moves, it continuously connects to nearby cell towers; each interaction is logged with associated latitude, longitude, and timestamp data. This means every movement, whether intentional or not, can leave a trail of tower associations. Forensic analysis of these records enables investigators to approximate a device’s path, identify location patterns, and correlate presence within specific geographic areas over time. FUN FACT: A mobile device does not need active user interaction to generate location evidence; simply being powered on causes it to continuously register with nearby cell towers, automatically logging movement over time. Cell tower data is critical for investigators because it provides an independent, system-generated record of a device’s movement, allowing them to place a suspect within a geographic area at a specific time, even when GPS, apps, or user-controlled data have been deleted or manipulated.

English
11
60
266
12.3K
Privacy Trash Panda đã retweet
Sooraj
Sooraj@iAnonymous3000·
This is the App Store privacy label for 𝕏 Chat. Metadata reveals who you talk to, when, how often, and where you are when you do it. That is often more valuable to an adversary than the message itself. "We kill people based on metadata." That is former NSA and CIA Director Michael Hayden.
Sooraj tweet media
English
8
11
48
1.4K
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
Meet “Kit”. The Firefox Web browser’s new, non-binary mascot. Yes. You read that right. Non-binary. With “They/Them” pronouns. Because, of course @Mozilla had to inject “pronouns”, and “gender identity” politics into a web browser.
The Lunduke Journal tweet mediaThe Lunduke Journal tweet media
English
336
148
1.7K
142.9K
Privacy Trash Panda đã retweet
Geoff Wacker
Geoff Wacker@GeoffWacker·
Geoff Wacker tweet media
ZXX
2
84
322
2.2K
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
France has begun plans to move government desktops from Windows to Linux. Each ministry must submit a formal implementation plan by autumn 2026 as part of the country’s push for greater digital sovereignty and reduced reliance on foreign technology providers.
Pirat_Nation 🔴 tweet mediaPirat_Nation 🔴 tweet media
English
372
1.5K
15.8K
553.1K
Privacy Trash Panda
Privacy Trash Panda@TrashcanPrivacy·
@liquiditygoblin Theory aside, it would be nice to not require or tie a phone number to your account for better privacy.
English
0
0
2
497
Liquidity Goblin
Liquidity Goblin@liquiditygoblin·
firmly believe signal is a long running NSA honeypot wdym your privacy driven app necessitates having a phone number? it’s not optional? all the messages route through American data centres????
Liquidity Goblin tweet media
English
94
49
869
49K
Privacy Trash Panda đã retweet
Tuta
Tuta@TutaPrivacy·
We did it everyone! We forced Google not to be evil. 💪 🎉 Side-loading will be cumbersome, but it will remain possible. Thanks everyone for speaking up against Google's plans! 🙏 ❤️
Tuta tweet media
English
41
188
2.1K
45.4K
Privacy Trash Panda đã retweet
H-1Beez Nuts
H-1Beez Nuts@H1BeesNuts·
The end goal of age verification is to normalize ID uploads so it doesn't seem as big of a rights violation when you eventually need to tie-in and register your social media account to your government identity like what is happening in Turkey.
English
4
81
214
1.7K