Frank Slootweg wrote on 14 Mar 2024 15:15:08 GMT :
Face it, as AJL hints at, that information is just on a *different*
server - than Samsung's, Google's, etc. ad infinitum - over which you
*also* have *absolutely no* control.
I am nothing but logical, Frank. Hence I agree with your main premise.
Only a fool disagrees with a sensible logical premise. And I'm no fool.
Hence, you are correct. But you extended it too much.
As did AJL.
What AJL said, in essence, was
A. They already got him.
B. So he just gave up.
C. *And in doing so, he make it WORSE by putting it on his phone*!
That's OK for some people like you and for AJL.
But that's not OK for me.
I don't give up - I just fight back differently.
You give up. AJL gives up. I fight back differently.
Your mistake isn't in your initial logic.
It's in extending that initial logic to your cell phone.
Don't do that.
Specifically, Don't extend the threat to your vulnerable phone!
1. Your data that the bank holds is definitely subject to hacks
2. But they pay people a lot of money to mitigate that risk
3. Your cell phone has NONE of those IT people mitigating risk
(All your cell phone has for an IT person, is little ole' you.)
If you think I'm not aware of all that, then it's you who is dreaming.
There's nothing wrong with your logic at the top level, since EVERY
database WILL (likely) be hacked (eventually) but what's wrong with your
argument is EXTENDING it naively to the smart phone.
Which has no IT department defending it.
Your argument is essentially only 1/2 of mine, which is:
A. You say every database will (likely) be hacked (which I agree),
B. And then (because of that) you extend it to the phone (which I don't).
You're thinking correctly - but you're extending too far.
I don't put anything on the phone that I can't easily lose.
1. No accounts.
2. No login apps (e.g., banks, credit cards, nothing)
3. No way of paying for anything (accidental payment is disabled)
4. No way of logging into anything automatically
(Of course, I have web browsers, which "can" log into stuff;
but I don't log into anything on the phone that I can think of.)
Hell, I don't even have a PIN on my phone (I don't live in a slum).
I keep the phone as a private citadel.
Sort of like how landline telephones were in the olden days.
The only thing they know is the stuff I can't change.
a. the phone number, make/model, carrier, IMEI, etc.
b. the IP address when on cellular
c. I do change my broadcasts to NOT shout out my hidden SSIDs
etc.
I consciously feed everything bogus data if it asks for such things.
It's why (almost) NOBODY gets my SSN (not even the state I live in when I
signed up for my drivers license from another state - where I said I never
had a drivers license and so I had to start the entire process anew, like a
17 year old kid would - simply because I wanted to give them a bogus SSN).
The only people who get "correct" ID information are people who
a) will check it (e.g., passport information), or,
b) people who need it (e.g., my federal taxes), or,
c) people who need it by law (e.g., police, fire, etc.).
(Even 911 location though is disabled.)
I've been privacy aware for a long time, which is why I maintain separate
email accounts for people who ask but who don't need it, and even then,
since they're protonmail, I always enter via a tor browser every time.
Anyway, the number of privacy things I do on a phone will number probably
in the scores to nearly a hundred (or whatever it is), which is about 99
more things than you or AJL can comprehend so it's no use explaining to
you.
In summary, you are correct in overall logic but wrong in implementation.
1. You are completely correct that data someone else holds is hackable.
2. But you went too far as to give up when it comes to protecting the phone
Your mistake isn't in the logic but in the implementation.