Posted on 7 Comments

Global Vaccine Passports Have Arrived Courtesy of Google, EU

On June 30th, 2021, the Google Developers blog announced the launch of vaccine passports in Android through its Passes API.

Less than 24 hours later, the European Union, long mired in a sea of national standards for digital jab records, rolled out its EU-wide vaccine passport.

Two completely different vaccine passport schemes unveiled on the same day, encompassing the whole of the Western world? What are the odds!

Exceedingly low, of course. This level of coordination belies yet another blitz in the ongoing rollout of a global, technofeudal control grid. The EU has arguably been at the forefront of this rollout – its standardized digital jab certificate is little more than an aggregator for the draconian technology now operating at the Nation-State level.

Adoption of this unified standard is already approaching 100% of EU Member States. Doublethink rhetoric of restoring the Schengen Area’s “freedom of movement” abounds, even as additional barriers to travel are erected.

In this sense, Google and the US are playing catch-up. While de facto vaccine passports have been implemented sparingly in places like New York, California, and Hawaii, an ever-expanding number of States have banned the notion outright.

Yet herein lies the insidiousness of the public-private partnership model: Technocrats can use governments where it suits them, corporations where it does not, and an increasingly bizarre fusion of the two where necessary. Even the propaganda rollout surrounding jab passports is bifurcated by this model, with the EU using official government bulletins while Google syndicates the news via trendy tech blogs.

And though many States in the US have passed legislation or executive action to curb the implementation of vaccine passports, Google could care less.

Google Passes: Vaccine passports for all, regulation be damned

Like the contact tracing API before it, political resistance alone is proving ineffective against the technological implements of the Great Reset. Even the staunchest State level opponents to this agenda have done nothing to halt the hyperactive Bluetooth surveillance grid running on Android and iOS devices – on the contrary, many have used taxpayer money to help finance its data harvesting operations.

Similar political action against digital vaccine passports will not halt Google’s rollout via the Passes API, either.

In fact, Google’s selection of the Passes API to implement vaccine records is telling in its own right, given the information it already stores: Boarding passes for airlines. Travel tickets. Event tickets.

While legislative action in States like Florida may allow you to attend a Miami Dolphins game with your biological privacy in tact, the same may not be said for travel. The battle over Federalization of airline travel was lost on November 19th, 2001 with the creation of the Transportation Security Administration, whose influence has been expanding ever since – the latest privacy affront being the REAL ID Act, which mandates highly insecure RFID technology for interstate air travel.

Even more dangerous are biometric companies with government contracts, like CLEAR, whose terminals are already widely used at TSA PreCheck terminals and event centers.

Google Passes and other digitized jab certificates are simply a competing product. One that is already in the pocket of 85% of Americans alone, with similar adoption levels in Europe.

Products marketed for “convenience” like TSA PreCheck biometrics will, over time, become mandatory – the REAL ID Act itself is a perfect example of this Fabian creep. Passed all the way back in 2005, its full implementation has been pushed back multiple times due to individual State holdouts, most recently until 2023.

But these delays are immaterial – the framework’s existence is all that matters, as despite not being enforced, privacy-violating RFID technologies are now the norm for US driver’s licenses. Jab certificates like Google Passes will be no different. Once in place, they will be utilized – if not immediately, then in the future.

Not only can the Passes API integrate with third-party pharmaceutical companies to track jab history, it is also capable of storing results from dubious PCR tests. This level of biodigital convergence sets an unsettling precedent, as Silicon Valley’s expectation is that your medical history will now be in your pocket at all times, integrated with their servers, and subject to whatever authority may ask for it.

Passes is not an isolated product, either – it’s a development suite within the broader Google Pay SDK.

There are technical reasons why Google may have chosen to use the Pay SDK as opposed to a health-focused API like Google Fit – QR code generation, limited use passes, and encrypted keyrings are already present in the Passes API. However, despite Google Pay’s scant consumer use at present, the long-term intent is crystal clear: Access to financial services and medical records will be intertwined.

In Closing

The post-2020 era has pushed humanity to the precipice of a longstanding dream of our would-be comptrollers. Whether it is Newt Gingrich’s Age of Transitions or the late Zbignew Brzezinski’s Between Two Ages, the kind of biodigital convergence represented by digitized medical passports has been at the forefront of the Technocratic agenda for decades.

As Silicon Valley attempts to bridge the “last mile” of mandated biometric surveillance, resistance to these aims on an individual level remain multivariate – ditch your smartphone, or at least utilize a privacy-respecting alternative that is incompatible with Google or iOS services. Starve the business of travel and entertainment industries that would see us become serfs in exchange for bread and circuses.

If you’re in the EU, use paper records instead of digital equivalents, or better yet, refuse to comply at all.

Educate well-meaning policymakers to the threats represented by the pseudo-private sector and impress upon them that the dangers of State surveillance are rapidly being outpaced by Terms and Conditions mandated by smartphone companies.

Neofeudal Technocracy is desperately trying to extract humanity’s consent to these draconian efforts before the next phase of the so-called Great Reset.

Don’t let them.

Stay informed, stay free.

The best degoogled smartphone and privacy news, straight to your inbox.

Share this:
Posted on 41 Comments

Meet Jigsaw: Google’s Intelligence Agency

It’s no secret that Google regularly collaborates with intelligence agencies.

They are a known NSA subcontractor. They launched Google Earth using a CIA spy satellite network. Their executive suite’s revolving door with DARPA is well known.

In the wake of the January 6th Capitol event, the FBI used Google location data to pwn attendants with nothing more than a valid Gmail address and smartphone login:

A stark reminder that carrying a tracking device with a Google login, even with the SIM card removed, can mean the difference between freedom and an orange jump suit in the Great Reset era.

But Google also operates its own internal intelligence agency – complete with foreign regime change operations that are now being applied domestically.

And they’ve been doing so without repercussion for over a decade.

From Google Ideas to Google Regime Change

In 2010, Google CEO Eric Schmidt created Google Ideas. In typical Silicon Valley newspeak, Ideas was marketed as a “think/do tank to research issues at the intersection of technology and geopolitics.

Astute readers know this “think/do” formula well – entities like the Council on Foreign Relations or World Economic Forum draft policy papers (think) and three-letter agencies carry them out (do).

And again, in typical Silicon Valley fashion, Google wanted to streamline this process – bring everything in-house and remake the world in their own image.

To head up Google Ideas, Schmidt tapped a man named Jared Cohen.

He couldn’t have selected a better goon for the job – as a card-carrying member of the Council on Foreign Relations and Rhodes Scholar, Cohen is a textbook Globalist spook. The State Department doubtlessly approved of his sordid credentials, as both Condoleeza Rice and Hillary Clinton enrolled Cohen to knock over foreign governments they disapproved of.

Google Ideas’ role in the 2014 Ukraine regime change operation is well-documented. And before that, their part in overthrowing Mubarak in Egypt was unveiled by way of the Stratfor leaks.

More recently, the role of Google Ideas in the attempted overthrow of Assad in Syria went public thanks to the oft-cited Hillary Clinton email leaks:

Please keep close hold, but my team is planning to launch a tool on Sunday that will publicly track and map the defections in Syria and which parts of the government they are coming from.

Our logic behind this is that while many people are tracking the atrocities, nobody is visually representing and mapping the defections, which we believe are important in encouraging more to defect and giving confidence to the opposition.

Given how hard it is to get information into Syria right now, we are partnering with Al-Jazeera who will take primary ownership over the tool we have built, track the data, verify it, and broadcast it back into Syria. I’ve attached a few visuals that show what the tool will look like. Please keep this very close hold and let me know if there is anything eke you think we need to account for or think about before we launch. We believe this can have an important impact.

-Jared Cohen to State Dept. Officials, July 25, 2012

With all this mounting evidence, surely Google Ideas was decommissioned. Surely Jared Cohen was swiftly ousted from his position at one of America’s premier Big Tech darlings for crimes against humanity, right?

Of course not!

Why scrap all that hard work when you can just rebrand and shift your regime change operations to domestic targets?

Google Jigsaw – USA Psyop Edition

Google Ideas was renamed Google Jigsaw in 2015 after years of bad press and controversy – this time with an eye on performing psychological operations in the United States.

But all that experience data mining and overthrowing Middle Eastern nations wasn’t just thrown out. Rather, Jigsaw repurposed its internal psychological operations program (code-named Operation Abdullah) to instead target “right-wing conspiracy theorists,” as revealed by privacy researcher Rob Braxman.

Using a technique known as the redirect method, Jigsaw attempts to populate outbound links to dissuade potential thought-criminals from looking at wrongthink.

Make no mistake – the redirect method is about more than manipulation of search engine results. It’s one thing to manipulate the content of searches based on query strings, but to target the psychology of the searcher themselves requires an accurate psychological profile of the person doing the searching.

And Google has psych profiles in spades thanks to centralized Google logins: To Android phones, to Gmail accounts, to adjunct services like YouTube, even to children via Google Classroom.

You don’t even need to use Google’s search engine to populate them with weaponized data. In fact, search alone provides far fewer avenues for offensive metadata usage than a cell phone.

We would implore readers to take a look at Jigsaw’s site. It’s a study in how to use front-end design to creep out your visitor, as a snippet of JavaScript code ensures your cursor is tracked in a spotlight throughout your visit:

Jigsaw’s front-end design team has a clear message for you: There’s nowhere to hide.

The site also uses another bit of intelligence tradecraft known as “transferrence” – it’s a simple psychological tactic of shifting blame from yourself to your target.

The four subheaders on Jigsaw’s homepage, Disinformation, Censorship, Toxicity, and Violent Extremism demonstrate this tactic at work.

  • There is no greater source of media disinformation than MSM and the information served up by Google search engines.
  • Big Tech are at the forefront of destroying free speech through heavy-handed censorship, Google among them.
  • Psychological manipulation tactics used by the social justice crowd doubtlessly instill toxicity in those subjected to them.
  • And Google’s well-documented history of participating in bloody regime change as described in this article are textbook cases of violent extremism.

Yet Jigsaw markets itself as combating these societal ails. Of course, nothing could be further from the truth, just as Google’s former company tag-line of “Don’t Be Evil” was a similar reversal of reality.

And yes, regime change aficionado Jared Cohen is still the CEO of Google Jigsaw. In fact, Jigsaw, LLC was overtly brought back in-house as of October 2020.

In Closing

As we’ve described in previous articles, vast swaths of the State-controlled Panopticon are currently being outsourced to Big Tech companies.

Call this phenomenon a public-private partnership. Call it the Great Reset. Call it Agenda 2030, or Agenda 21, or “stakeholder capitalism,” or any of the other euphemisms dreamt up by these hapless would-be oligarchs to sell neofeudal Technocracy to the public.

Making intelligence services pseudo-independent from the State is simply a mandatory prerequisite for fully globalizing them.

Furthermore, as the Biden administration seeks to reclassify half of the country as domestic extremists, it’s no secret that companies like Google, with their vast data weaponization programs, will play a key role in identifying Public Enemy #1:

You.

There is no “silver bullet” solution to this problem. Nearly all consumer electronics can be exploited at very low levels. Even the Internet itself is a longstanding military intelligence operation.

But this doesn’t mean any action short of becoming a Luddite is meaningless!

If data is the new oil, it’s time to shut off your well:

  • Abstain from using Google Mail, Docs, or Search where possible.
  • Seek out alternative social media and content creation platforms.
  • If your smartphone requires heavy dependence on Apple or Google for logins or closed-source apps, consider privacy-respecting alternatives.
  • Familiarize yourself with common data harvesting tactics and take action where you can.

While a full list of meaningful action is beyond the purview of this post (or any single blog entry for that matter), the important takeaway here is this:

We cannot opt out of mass government surveillance. But we knowingly consent to most forms of “privatized” intelligence gathering.

Take the first step and revoke your consent.

Stay informed, stay free.

The best degoogled smartphone and privacy news, straight to your inbox.

Share this:
Posted on 17 Comments

PROOF: You Cannot Disable Contact Tracing

As we have covered in previous posts, there is no simple way to disable contact tracing on your smartphone.

If you’re using an iPhone or an unmodified Android device, the Exposure Notifications toggle in your settings is simply for show – a Potemkin village of privacy. There’s no way to audit the code and verify that your phone is no longer a hyperactive Bluetooth location tracker when you switch your contact tracing slider from ON to OFF.

However, this privacy threat was theoretical… until now.

News broke this weekend on Hacker News that, at least in the State of Massachusetts, Google can outright ignore your contact tracing preferences.

But it gets worse.

They can also install State-sponsored tracking applications without your knowledge or consent.

The application in question, MassNotify, does not have a visible icon on your smartphone. It cannot even be found by direct search in the Google Play store. For all intents and purposes, it is a ghost in the machine.

Yet if you live in the State of Massachusetts and have an Android phone, MassNotify has likely been installed on your smartphone completely unbeknownst to you.

As one user from Hacker News reports:

I turned off auto-updates in the Play store (Settings -> Network preferences -> Auto update apps -> Don’t auto update apps) and went to sleep.

This morning I woke up with a cheerful notification that Google can help with COVID notifications and gov.ma.covid19.exposurenotifications.v3 installed — the app was pushed overnight over explicit instructions NOT to update (sure, one can say auto-install != auto-update, but it is worrying that forced pushes can happen even with every single relevant UI switch turned off).

madars

This user goes on to detail the ADB logs confirming malicious intent – if you’re the technical type, we’d recommend you take a look.

The fact that Google can ignore user input barring auto-updates should be unsettling enough, as it means you have no autonomy over the software running on your device. Yet Hacker News user madars goes one step further, confirming that they had disabled Exposure Notifications as well:

Yes, I confirmed last night that Settings -> Google -> COVID-19 Exposure Notifications was off.

madars

To make matters even worse, they also confirm there is no record of MassNotify having been installed to the average smartphone user – and that it’s possible two separate binaries of MassNotify were shipped depending on the user’s contact tracing settings:

Aside, I read somewhere but have not confirmed this myself that manually enabling that setting leads to a flow for installing the gov.ma.covid19.exposurenotifications app, whereas the forced update is gov.ma.covid19.exposurenotifications.v3 — note the extra v3.

By the way, MassNotify app is not visible from Play Store search (both on mobile and on desktop — https://play.google.com/store/search?q=MassNotify) and does not create an icon — you can only find it in Play Store via its internal name (e.g. a link like https://play.google.com/store/apps/details?id=gov.ma.covid19…), and would have to specifically look in system dialog for all apps to see if it is installed.

madars

Not only are Google and the Massachusetts Department of Public Health covering their tracks when installing this unsolicited spyware, they’re tracking whether or not you are the type of person who would disobey contact tracing edicts in the first place!

Google is not simply ignoring user consent in their ongoing mass surveillance dragnet. They are actively enabling governments in creating a “biosecurity surveillance” apparatus – whether you want to participate or not.

Previously, Apple and Google required the installation of third-party software like MassNotify to integrate with the contact tracing API, but as of October 2020, both companies offer this “service” in-house.

When the Davos and World Economic Forum crowd stress the need for public-private partnerships, this is what they mean: A panopticon that fuses the data collection efforts of pseudo-private entities like Google with the enforcement arm of the State.

So how do you really disable contact tracing?

The simplest solution to disable contact tracing is arguably the hardest for most people:

Get rid of your smartphone.

No, that does not mean go out and buy a flip or “dumb” phone in lieu of your fancy new iOS or Android device – even dumbphones are notoriously smart in the era of the Great Reset.

It means get rid of your cell phone altogether.

Are you capable of that? Many people aren’t – either due to employment circumstances, lifestyle, or lack of rural Internet access. Even simply leaving phones at home is increasingly difficult in a fully networked society.

There is, however, a secondary solution:

Use a phone that respects your privacy.

Unbeknownst to many, there are alternate operating systems for many smartphones that contain no contact tracing code – and optionally – no connection to Big Tech services whatsoever. The smartphone in your pocket right now may be capable of attaining this privacy with a bit of elbow grease.

And if you’re not the technical type, there are even outfits that offer preconfigured privacy smartphones.

They’re not a “silver bullet” by any means, but go a long way in protecting you from the threats described above.

Furthermore, simple solutions like faraday bags can sever all wireless communications with ease – just in case the panopticon decides to use cell carriers themselves for contact tracing in lieu of Big Tech APIs (which, if you live in the UK, is already happening).

It’s easy to become disheartened or fatalistic in this emerging Technocratic era where digital autonomy and privacy are viewed as little more than a pipe-dream. Yet for the time being, there are still avenues of escape for those willing to venture off the beaten path laid for us by Silicon Valley predators.

Stay informed, stay free.

The best degoogled smartphone and privacy news, straight to your inbox.

Share this:
Posted on Leave a comment

LineageOS vs OxygenOS: Should You Switch?

When it comes to custom ROM choices, OnePlus users are awash with options! As such, choosing LineageOS vs OxygenOS is a hot topic among OnePlus smartphone owners.

While most users will likely stick with the stock OxygenOS image, LineageOS is a popular alternative. Why might someone choose LineageOS over OxygenOS, given that both purport to be as close to “stock Android” as possible?

For starters, LineageOS is widely known as a great ROM for breathing new life into old smartphones. Owners of dated OnePlus models can keep their software up to date long after it has stopped receiving official updates.

Yet a second reason for reconsidering OxygenOS is now emerging: Privacy.

Privacy from who, you might ask? Both OnePlus itself and, optionally, the Google surveillance dragnet.

OxygenOS and Data Harvesting Backdoors

As a hardware manufacturer, we’ve got to hand it to OnePlus. Their smartphones are of incredibly high build quality and their commitment to unlocked bootloaders is a rarity, especially in the US smartphone market.

We at PrivacyToGo happily carry fully degoogled OnePlus devices in our shop without OxygenOS for this reason.

However, the stock OnePlus ROM, OxygenOS, has a more sordid history.

2017 was a rough year for OnePlus, the Shenzen-based manufacturer behind OxygenOS, as two major privacy scandals rocked the company.

First came the revelation of OnePlus Analytics, a tool that can only be described as spyware. Privacy researcher Chris Moore unveiled on his blog a set of API calls being made by OxygenOS, and the revelations were startling.

OnePlus was collecting vast swaths of data on OxygenOS users without their consent, including:

  • Serial number
  • Phone number
  • MAC address
  • IMEI (unique device identifier)
  • IMSI (unique carrier identifier)
  • ESSID (wireless network data)
  • Timestamped application usage

That’s a lot of personally identifiable information.

Just weeks later, another privacy researcher revealed Engineer Mode, a backdoor to OnePlus root access in devices with Qualcomm chips.

OnePlus was quick to retract their data harvesting operation, but the question remains: Can OxygenOS be trusted with your data in the future?

Well, as of September 2016, OnePlus merged development of its Chinese-only HydrogenOS with OxygenOS. In other words, the Chinese Communist Party’s surveillance requirements are now being applied to OnePlus devices the world over.

Furthermore, OnePlus development of OxygenOS only began after a high-profile trade dispute in India barred them from shipping CyanogenMOD (the predecessor of LineageOS) to that market. Rather than sell OnePlus devices with open-source alternatives by default, OnePlus opted to develop its own OS with spyware in tow.

But if this isn’t enough reason for privacy aficionados to choose LineageOS vs OxygenOS, the second threat to your digital autonomy is far more pervasive.

Google Apps: A Privacy Nightmare

If you’re an Android user concerned about privacy, Google is doubtlessly the biggest threat to your autonomy.

The risks presented to individual privacy by closed-source Google Apps on Android are almost too many to list. Contact tracing. Hyperaccurate location data. Device fingerprinting. Alert snooping.

An exhaustive list is beyond the scope of this article.

But when it comes to LineageOS vs OxygenOS, the choice is clear: OxygenOS cannot be degoogled.

LineageOS, by contrast, is almost tailor-made to remove Google spyware.

By default, LineageOS ships with no Google Apps or centralized Google fingerprinting whatsoever. In the battle of who is closest to “stock Android,” LineageOS is the clear winner over OxygenOS and its built-in Google App suite.

In addition, forks of LineageOS exist to restore some of the GSuite’s core functionality while simultaneously providing disinformation to Google servers, all while remaining open-source. The same is simply not possible with OxygenOS.

In short, if avoiding Google’s heavy-handed surveillance is the reason you bought a OnePlus device, you’re best off getting rid of OxygenOS altogether.

LineageOS vs OxygenOS: In Closing

For the privacy-conscious smartphone user, OxygenOS is simply not preferable.

OnePlus-developed software has proven time and again that it cannot be trusted with sensitive user data. And worse, Google as a whole is equally untrustworthy despite powering a shocking 87% of all mobile internet traffic.

Thankfully, OnePlus’s longstanding commitment to unlocked bootloaders means that smartphone owners aren’t stuck with OxygenOS unless they want to be.

If privacy is at the forefront of your tech concerns, consider flashing LineageOS to your OnePlus smartphone.

And if you’re concerned about Big Tech snoops like OnePlus and Google but are intimidated by the technical nature of changing your smartphone’s OS, you can always purchase a degoogled OnePlus device directly.

Stay informed, stay free.

The best degoogled smartphone and privacy news, straight to your inbox.

Share this:
Posted on 24 Comments

How Contact Tracing Works – Two (Equally Creepy) Case Studies

Do enough people know how contact tracing works?

One of my favorite weekly news wrap-up shows recently covered an interesting story.

It was from the Telegraph and entitled, “Millions ‘unwittingly tracked’ by phone after vaccination to see if movements changed.

The article’s contents are interesting – if not unsurprising – to those against the rising Surveillance Oligarchy. But the reversal from “contact tracing” the supposed ill to instead surveilling the vaccinated is worth noting, as is the method of tracing described in the article.

Is humanity aware of the multivariate methods of contact tracing beyond the toggle switch in iOS and Android?

And just how do the methods being used by the Anglo-American Establishment at Oxford University in the above Telegraph story differ from those being dreamt up by Silicon Valley?

The short answer is that multiple entities (namely your cell carrier, Google, Apple, and their State and corporate affiliates) are all vying for their position in the emergent Panopticon. The long answer has to do with resolution and accuracy of metadata, but we’ll get to that momentarily.

“We kill people based on metadata.” -General Michael Hayden

Most people know that contact tracing is a form of person-to-person surveillance using cell phones. Some know that Bluetooth is involved. Others are aware that cell carrier data can be used for contact tracing directly.

The deeper story lies in how each of these methods is accomplished, and by whom.

In this article, we’ll take a look at the technicals of contact tracing – examining the (limited) source code and source documents where possible and unveiling other engineering methods utilized where we can.

Apple <3 Google: A Match Made in Hell

The first time Apple and Google crossed paths, Google CEO and Apple board member Eric Schmidt silently stole the concept for Android from Apple’s iOS.

The two operating systems now account for nearly 60% of all web traffic.

So it is no surprise that these surveillance titans, after cornering most of modern web traffic, turned to weaponize it under the auspices of a public health crisis in May of 2020.

Despite a propaganda push to ensure the public that contact tracing surveillance data is “private,” it is anything but – while a lone hacker may have trouble fetching and decrypting packets sent by this contact tracing API, the companies behind contact tracing and their affiliates have already pwned you.

Apple and Google can ruminate all they want that their contact tracing data being sufficiently encrypted and private:

…yet their own API documentation reveals that all contact tracing is done on the Big Tech surveillance grid:

This code from Google’s contact tracing API (or Application Programming Interface), is closed-source and unauditable. But for the layman, the concept of the API is simple – it’s a bit of code that performs calculations from a third-party server and returns data to whoever asked for it.

In the case of Apple and Google’s contact tracing API, they’re the ones crunching the numbers. And they can share those results with whoever they want – governments, health insurance providers, police, intelligence agencies, you name it.

This doesn’t sound very private to me.

Even if identifiers to these API calls are 100% anonymized and encrypted, Apple and Google can still associate your identity based on your Gmail or iCloud device login. In other words, the opposite of private.

While both Apple and Google have alleged methods to disable contact tracing in their settings, there is no way of verifying that this functionality is actually turned off. Apple’s code is entirely closed-source, and while the Android Open Source Project is fairly open, Google’s contact tracing and gApps code is anything but.

And like any good future-proof protocol, the contact tracing API is extensible – in other words, its spec allows transfer of data over Bluetooth that can be defined in the future which may or may not have anything to do with alleged “health” screening:

Note the “Reserved for future use” byte identifiers

If Big Tech is good at anything, it’s stacking functions; today’s contact tracing API to fight a supposed global health menace is tomorrow’s turnkey vaccine passport (or social credit system). And the associated metadata predefined by the contact tracing Bluetooth spec demonstrates that additional capabilities were planned from the beginning.

Google has been performing hyperaccurate location snooping via WiFi triangulation for nearly a decade. Contact tracing is simply the latest iteration – spying from device-to-device via Bluetooth. This technology has likely existed for many years as well.

What is surprising is its blatant openness.

While both Apple and Google attempt to bedazzle users with talk of public-private key cryptography on intake servers, make no mistake – every phone with iOS or a Google account installed has a unique fingerprint, which makes associating an encrypted key with your identity relative child’s play:

Apple and Google admit to fingerprinting “legitimate user device(s)” while simultaneously claiming confidentiality.

Given that we have no idea what other metadata is logged by these “ingestion servers” or the associated database schemas, this assurance of anonymity is no more legitimate than a condo on Olympus Mons.

Both Google and Apple took this surveillance apparatus to new heights in late 2020, offering to collate data directly for State agencies without the need for them to build their own applications. Surveillance as a Service.

Yet in a world where cell phone carriers and three-letter agencies already have so much data about us, why have Apple and Google gone to such great lengths to establish their contact tracing APIs?

Privatizing former State apparatuses is one reason. Most people “consent” to smartphone Terms and Conditions, which are admissible in court. It’s hard to say that anyone consents to what happens in Bluffdale, Utah.

But another is granularity of data – Apple and Google already have a direct pipeline into your digital existence, no backdoors required. They log your location. Your emails. Your text messages. Any alert popup whatsoever, an oft-overlooked surveillance tool. Your speech. Even the way you move via accelerometer.

Why steal what is given freely?

Pipelining this data directly to the highest (or most powerful) bidder is an obvious information warfare benefit.

And your cell carrier wants in on the action, too.

Oxford University and the Cell Carrier Snoops

The kind of “vaccine tracing” surveillance described by the Telegraph is a completely different beast. Rather than utilize the contact tracing API data, Oxford University opted to go to cell carriers directly:

Cell tower data vs. API collection data, via the Telegraph

Oxford couldn’t take advantage of the contact tracing technology above (yet) as they were explicitly tracking those who’d taken the jab, not those diagnosed with the magic virus.

But as a relatively competent programmer myself, I bet they wish the contact tracing API could fulfill this mandate. The resolution of data and amount of potential information collected is simply much more personal, and in turn, accurate, when using Apple and Google’s API.

And as described above, Google and Apple’s Bluetooth specification is already extensible enough to support this use-case in the future.

Given these limitations, Oxford went to cell phone carriers directly. And there’s still a good amount of data to collect at the cell tower level, from the IMEI (device identifier) to the IMSI (carrier customer identifier). So the above assertion that the data collected is not “individual surveillance” is patently ridiculous, as there’s at least two unique identifiers collected by cell towers off the top of my head.

With 5G, this information nexus expands rapidly.

High-gigahertz spectrum RF like 5G is something of a trade-off – it allows significantly greater resolution of location data on urban serfs and far greater speed of data transmission while making only incremental surveillance gains in the countryside.

So if you are tracking a city like, say, London, for “vaccine reactions,” 5G fits the bill pretty well. What’s good for the goose is not necessarily good for the gander, as they say.

Yet this is also a prime example of mutual back-scratching – while telecoms themselves have a role to play in the emergent Surveillance Oligarchy, cell phone OS companies also stand to benefit from emergent 5G technologies. Imagine a future where Google and Apple have the bandwidth at the cell tower level to “livestream” your camera and microphone perpetually without your consent.

No need to imagine, as in many urban environments, this future is the present.

In Closing

In this article, we’ve examined two methods of how contact tracing works – the Silicon Valley API method and the cell carrier method, how both can be weaponized for either “health” screening or vaccine tracing, and how the latter’s methods ultimately enforce the former.

As an individual, what can be done to opt out?

Clearly, ticking off the “no contact tracing” option in your smartphone’s settings is simply not sufficient. Especially in a world where vaccine passports will soon supplant “illness” tracing using the same underlying technology.

If you’re using an iPhone, the solution is simple: Pitch it.

If you’re using an Android smartphone, you at least stand a chance against API metadata aggregation, the most dangerous form of corporatocratic surveillance described in this article.

Your ultimate solution is to degoogle – the Android OS is, for the time being, open-source. This means you can flash your own variant of Android without Google, or if you’re so inclined, purchase a degoogled phone directly.

There’s not much that can be done regarding carrier tracking aside from pulling your SIM card or ditching your phone entirely – even flip phones are no longer a viable alternative, with the phaseout of 3G and Google’s recent purchase of KaiOS.

The emergent digital Panopticon is rapidly taking shape around us, and while the front door slammed shut in May of 2020, there are still windows of escape.

Seize them while you can.

Stay informed, stay free.

The best degoogled smartphone and privacy news, straight to your inbox.

Share this: