• TCB13@lemmy.world
    link
    fedilink
    English
    arrow-up
    60
    arrow-down
    1
    ·
    1 year ago

    So let me get this, phone was wiped and a new SIM installed. That article is a piece of garbage. Phones have a IMEI that won’t change, so when she puts the new SIM card it will be identified as the same phone. We also know that Google - let alone authorities - was ways and deals to get IMEIs from Android phones and carriers so… so much for taking a phone off the grid.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      1
      ·
      edit-2
      1 year ago

      It’s not a great guide, but it’s a decent article. The journalist doesn’t understand enough to give advice, but to tell their story. Their adversary was identifying them by phone number, they got a new number and that worked for them. So it worked for their threat model.

      They just don’t realize there is so much more to the story.

    • BrikoX@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      2
      ·
      1 year ago

      One key part you missed was that she got used phone, so the IMEI is not tied to her identity. It’s far from perfect execution, but for the stated goal of not being able to be identified by the phone number, it’s adequate.