this post was submitted on 08 Jun 2025
20 points (91.7% liked)
Privacy
38615 readers
475 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I have the exact same setup as you lol
You can also use the Aurora Store and not use appls from the playstore.
I also have a separate SIM in here from Redpocket. You could buy the $30 annual plan on ebay with a visa gift card or something to make it slightly more hard to trace you down. And ofc you can use Signal and no log kyc VPN to do your activities.
And Obtainium for open source apps. I use Aurora only for apps I can't get via Obtainium.
Can't use Redpocket. I'm in the UK. All require kyc since is in Europe. What should I do?
If you use Signal, they don't collect your information at all. I believe it's only your phone number, registration date, and last time you pinged their servers. They don't get any messages you send.
As for mail, I think this one's a tricky bastard but if you use VPN, something like protonmail won't receive anything on their end, maybe some metadata from when you sent the email though, and assuming the other person is also using protonmail or pgp encryption.
I personally also have a threat model outlined and have 2 phones. One cheap flip phone with my redpocket sim which I use for government and banking stuff. My tmobile phone is for anything else, like friends and social stuff. Maybe you could have the same thing set up.