/meta/ - Meta

Discussion about the site

Mode: Reply [Return] [Go to bottom]


Max message length: 4069

Password: (For post deletion)
  • Allowed file types: image/png, image/jpeg, image/gif, image/bmp, video/webm, audio/mpeg, video/mp4, video/ogg, audio/ogg, audio/webm, audio/flac, audio/m4a
  • Maximum number of files per post: 5
  • Maximum file size: 300.00 MB
  • Read the rules before you post.

Best way to browse cutiegarden on mobile? Cutiegarden on mobile 01/19/2021 18:43:03 No. 4950
It's a pain imo to use on mobile.
Is there any better way than mobile browser?

I'm open to all suggestions ~

> Is there any better way than mobile browser?

Yes, there is:
Don't use a mobile device on a pedo imageboard...., use an actual computer like a normal person.
The future is now old man. Everyone uses mobile.
You can try one of the dozen tor browsers if you want but I have yet to have any luck. Asusming this is what you're talking about?

Only young idiots use mobile to access sites such as these. You think you're being young and hip and 'with it' by using a small mobile device to access the internet and visit questionable sites but you're actually being stupid. There's NO security or privacy when using a mobile and it's subject to search by any old cop who comes along (and you're young and stupid enough to be conned into giving consent for search).

With a desktop computer, you can beef up the security by using VeraCrypt to encrypt the entire operating system, using an off shore proxy that is always on, and securing your data connection to the internet. You can also store files on encrypted, external hard drives.
Here is a copypasta why you should not be a stupid fuck using a phone

Your every interaction with an android device is logged. When you tap, it spews log entries. File names and details are logged. Every time URL is passed to app or between app and helper such as downloader used by browsers, it gets logged. These logs are silently uploaded. Google gets what ever they want, app developers get logs from their own apps, manufacturers may take every log entry from every app on device (as Amazon did with Kindle Fire). You have no control over what is logged and who gets it. Some apps sell their collected data. Multiple parties have records of your activities on your device held permanently. Both your manufacturer and your carrier can silently push software onto your device. Law enforcement agencies have worked with carriers in past to push spy software onto targeted phones. If they do not wish to go through carriers, then there are routinely-discovered vulnerabilities in phone's software and mobile baseband firmware that allows phone to be silently accessed and controlled over radio. This can be done with Stingray devices such as those sold by NSO Group.

Changing SIM changes your IMSI but not your IMEI. IMEI is unique ID built into phone itself. Both are recorded by mobile masts. They are also logged by apps to uniquely identify your phone. So all you accomplish by changing SIM is linking multiple SIM's together as owned by same person because they are used with same IMEI (same device).

Location of your device is continuously logged and history is kept by mobile provider. This happens even if you disable location services in phone. Mobile providers routinely provide this info to LEA and in some countries, including the US, they even sell your location history. If you used your own Google account or any other account in your own name on a device, it is effectively registered to you now, because IMSI/IMEI is tied to your account as convenient unique ID. All of your logged activity is also associated with this ID. Unless your phone itself was purchased with cash, its IMEI is connected to you. IMSI/IMEI is connected to your location history. If mobile masts have you triangulated to your home, then any one who wants to look can see that it is you.

The Intercept wrote: In 2008, authorities used a StingRay and a KingFish to locate a suspect who was using an air card: an internet-connectivity device that plugs into a computer and allows the user to get online through a wireless cellular network. The suspect, Daniel Rigmaiden, was an identity thief who was operating from an apartment in San Jose, California. Rigmaiden had used a stolen credit card number and a fake name and address to register his internet account with Verizon. With Verizon’s help, the FBI was able to identify him. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. They then walked around the apartment complex with a hand-held KingFish or similar device to pinpoint the precise apartment Rigmaiden was using.

These devices leave your data all over them. They have caches of contents of RAM (including passwords) and images from your display. Even if you use wiping software, some caches are not accessible without root and flash wear-leveling means that no data can be wiped with any assurance. The built in encryption of android and apple devices has a backdoor which enables law enforcement agencies to access files.

Google “Assistant” records users' conversations even when it is not supposed to listen and Google workers listen to voice recordings.

Good advice! In other words, don't use a mobile devise to access any questionable site or download questionable material.

I have a smart phone but only use it to access Google maps and send messages and talk to only people that I know and family. I have never connected to email or banking information or any other sites on the internet with it. I know that while it's in my pocket, it is subject to search at any time; whether by a cop in person, border guard, or accessed by some law enforcement hacking devise remotely. If it is searched, they will find nothing other than messages from my wife and me talking about grocery shopping lists.

There is a cool Deniro movie called The Score. In the beginning, it shows Deniro's character posing as a plumber repairman. By all outward appearances, he appears normal enough. He has a shop, a company van full of tools, business license, etc. He drives past all the license plate readers, crosses the border, etc. Once across, he pulls over to a remote area and changes his clothes, his disguise, changes license plates, etc. When he returns to his shop, he hides his stolen materials in a hollowed out propane tank.

It was cool because he worked within the surveillance system that he found himself under. He didn't completely hide from it but he presented himself as the average Joe to it and keep his clandestine activities hidden from it. In other words, don't cloak yourself completely from the surveillance state but learn how to present yourself to them as the average Joe to them and stay off their radar. So even if they suspect you and start following you, they'll find nothing unusual about you.

Just carry around your cell phone and present yourself as the average Joe just texting shopping lists with your wife. But keep your questionable activities well-hidden and cloaked.
>Best way to browse cutiegarden on mobile?
>Don't use a mobile device
>Only young idiots use mobile to access sites such as these.
Most people visit this site with their bare IP. While I would always recommend against doing so, it clearly doesn't matter much in reality.

Use or just use regular firefox if you visit the site with bare IP anyway.
Open file 119.48 KB, 1141x700
Smartphones, Windows, Google Chrome, VPNs are jewish. These things will spy your every move. You should use Linux/OpenBSD and Tor for daily browsing, not only for watching cuties.

No Cookies?
Click here for captcha