Resources

Is Going Ghost and Digital Privacy a Myth?

going ghost MARK37 phone

Is “Going Ghost” really even possible while still using smart phones and laptops and living in the surveillance state that we have now?

Every now and again some geek will reach out and attempt to discredit our “Ghost” products and services. The claims are always related to one, some, or all of the following:

  1. …but you use Google Pixel phones!  GOOGLE made the phones!
  2. …but it’s impossible to not be tracked by the mobile service providers!
  3. …but the hardware provides back door access to (Google, China, intelligence agencies, hackers, etc.)

I’d like to set the record straight here so I don’t have to keep having the same conversations over and over again.

The “…but Google” Argument

We believe Google is evil.

We believe their “DO NO EVIL” slogan was a joke from the start.

We know the vast majority of their revenues during their first few years (and a large % even today) were coming from the online porn industry.

We know their intentions from the onset have always been to become a primary tool for global surveillance and, to this end, we know they were initially funded via various DoD projects and have always been closely connected to our intelligence agencies.

This is all true.  Follow the money.  Look at the ownership.  Learn the ethos of the ownership.

Thus, it makes sense that some people may initially think that by using the Google Pixel phone we are simply supporting Google or allowing Google to track you.

This; however, is not the case. Here’s why…

google is evil

Refurbished Phones

No $ goes to Google when we buy, or you buy, one of our devices.

This is because we believe the planned obsolescence economy is a fraud and should be stopped.  The phones we are selling are refurbished “mint” or “near mint” condition Google Pixel devices bought from resellers across the country.

With nearly 15 billion mobile phones on the planet and a population of only 8 billion, there are an almost infinite supply of used “near mint” condition phones that work extremely well.

There is absolutely NO NEED to manufacture new devices.

New devices require the mining of more precious metals out of the earth using child labor and what we know are horrific conditions creating massive waste and pollution in countries such as China and Africa.

All those who sell, or are working on developing, NEW “secure” phones (such as Gabb, Unplugged, Elon Musk’s proposed “Tesla Pi” phone or even the new phone Gregg Phillips is purported to be working on) are thus creating more DEMAND for the manufacturing of the required minerals and materials harvested by the exploitation of labor overseas.

They are also mostly all using closed source operating systems, which is something we fundamentally disagree with for all the reasons I discuss during my live Digital Privacy Bootcamps.

Hence, when you’re buying a Ghost Phone or even a Ghost Laptop from MARK37, you’re not buying a brand new device.  You are buying a refurbished device that we have sourced to ensure functionality and, more importantly, the ability for us to wipe off all Google or Microsoft software that was loaded on the device.

For phones, this requires finding devices that are “OEM (Original Equipment Manufacturer) unlocked”, which is much different than the “Carrier Unlocked” phones you can find at Best Buy or Walmart.

Note: A huge reason why Apple, Google and other phone manufacturers continue to come out with new “upgraded” devices is so they can run more background applications on the phone which are intended to process all your activities and spy on you MORE easily.  By adding so much processing power to the device they are making it so that this work load no longer needs to come from their own “cloud” services… saving them money.  In addition to creating the demand outlined above when you buy a brand new device, you are also now paying THEM for the privilege to spy on you cheaper than they were before.

They sell you the “sizzle” of an upgraded camera or digital personal assistant while they quietly leverage the device to further monetize you and reduce their overhead.

Ironically, yes, Google Pixel devices, once the Google Android system is removed, are among the most secure and private phones available.  The Google Pixel, with the open source operating system GrapheneOS, provides optimum security and privacy.

There are a few open source mobile operating systems such as LineageOS and CalyxOS, however, through our testing we have found GrapheneOS to be the most secure mobile operating system available.  Unfortunately, it works specifically and exclusively on Pixel devices at this time.  Installation of GrapheneOS on other devices is experimental at best, not supported, and will likely provide only limited functionality.

Google Hardware?

Thinking that Pixel phones use “Google Hardware” is also not entirely accurate.

This is very much like like saying “Dell hardware” or “HP hardware” or “Apple hardware”.  Dell, HP and Apple may be involved in the process of telling the manufactures what specific components they need and why they need them, or providing design specifications to the companies who manufacture the outside shell and casing for the device, but it’s not the HP, Dell, Apple or Google engineers actually designing and manufacturing the motherboards and components themselves.

These components are almost all commodity hardware with very little variation and choice.

The Google Tensor chip in the Pixel 6, 7, 8 and 9 devices (not in the Pixel 5 or prior models) follows the same logic.

Did Google build this whole chip in house?  No.  They participated in the process of the design to ensure the chip was optimized for the device… but they didn’t design/build and write all the logic for the device.  Nor were they responsible for manufacturing the devices.

To do so requires a technical skill set that currently resides within the chip manufacturers.

In theory, MARK37 could design our own phone and chip set as well; however, it would require us making a substantial volume commitment to one of the OEMs (Original Equipment Manufacturers… aka someone who manufactures and assembles devices) about what we want the look/feel/specs of the device to be.

By doing so, we would also only be contributing to the demand for more slave labor to mine more materials to create brand new devices… which we feel are entirely unnecessary.

But why the Google Pixel phone?

The open source Android operating system (AOSP) is to mobile devices what Linux is to open source operating systems on laptops and desktops.

Android is an open source framework.  Google takes this open source framework (like a blueprint for a building) and then adds to it all their applications and spyware to make it a CLOSED SOURCE Google Android operating system… or what most people know today as “Droid”.

Nearly all mobile operating systems outside the iPhone leverage the open source Android operating system to this extent.

The Pixel phone is specifically designed to be optimized to work with the open source operating system Android.

When designing the phone, Google was very specific with the manufacturer as to what hardware and firmware they wanted to ensure the phone was as fast and compatible as possible with the Android operating system… which their Google Android operating system is based on.

As a result, Samsung, LG and all other phones on the market do not have the specific functionality that the Pixel device has, which in large part is what allows the open source GrapheneOS operating system that we install on our “Ghost Phones” to be as secure and private as it is.

For more details on exactly what functionality I am referring to above, I recommend digging through the documentation found on the GrapheneOS.org site HERE.

towers everywhere

The “… but Carriers can always track you” Argument

Yes, AT&T, Verizon and T-Mobile definitely can and do continuously monitor location data on each mobile device.

This is a byproduct of the technology itself and how voice, text and data services work on the phones.

I discuss this topic at length during our Digital Privacy Training Bootcamps, with a focus on how you can mitigate both the information being gathered from the carriers and how useful the information is when it is collected.

The simple reality is that if your name and contact information are associated with the phone number you are using with one of the major 3 carriers in the US (AT&T, Verizon, T-Mobile), or one of their wholly owned subsidiaries, you have, of course, made it very easy for them to know where your specific device is located at any given time.

If you are using their voice and text messaging services without encryption (and/or using Google, Apple, Microsoft or Amazon operating systems) you’ve also made it even easier for them to collect and make sense of the information you’re sharing using their services.

Logically, this should make perfect sense because they control your phone number and deliver the services. Despite this, there are a few things we CAN do to help mitigate the information collected and the usefulness of the data collected.

Use a Reseller (aka a Mobile Virtual Network Operator or “MVNO”)

Use a MVNO that isn’t owned by one of the major carriers.  This adds a layer of bureaucracy between you and the Big 3 carriers because MVNOs do not NEED to provide carriers the contact information or name of who is attached to the phone number being used on their network.

Anonymously Prepay for Services from a MVNO

A few resellers still allow you to purchase plans by pre-paying for the service, on-site, at one of their stores.  In most cases, when this is possible, you are also able to purchase a plan, get a SIM card, activate a new phone number with any prefix you want (make it Hawaii if you want… even if you live in Ohio) and NOT have to give them any identifiable information.  They will certainly ask for it, but you can either make something up or simply tell them you do not wish to provide it.

Use a prepaid debit card to re-up the account or simply pay cash at the store to add more months as needed.

Use a VoIP phone number

Another way to make it much harder for the carriers to pinpoint and track your every move is to use a Voice Over Internet Protocol (VoIP) phone number through jmp.chat or voip.ms.

This will limit your ability to make calls or send messages when your data connection is out of reach, or when there is no WiFi network available to connect to, as your call will not be running through the traditional mobile phone network, but the internet.

Use an operating system on your device that isn’t owned/controlled by Google, Apple, Microsoft or Amazon

If I control the operating system, I control the device.  I have free reign access to all activity and functionality of the device.

This is what Google has with your device when you use their Google Android operating system.

This is what Microsoft has with your device when you use their Windows operating system.

This is what Apple has with your device when you use their iOS or MacOS operating systems.

This is what Amazon has with your device when you use their Kindle Tablet.

As such, any encrypted applications you may leverage on the device (Signal, Sessions, Telegram, Proton…) are rendered useless if someone else controls and has access to your operating system.

Despite someone not being able to decrypt the data once it’s captured as it flows from one device to another, if I can see what you see or hear what you hear on the device, the encryption is pointless.

Use encrypted messaging services…

Our communications are only as private as the weakest link, and for the reasons mentioned above, if you truly want to keep a conversation private you need to ensure BOTH or ALL parties involved are not just using an encrypted messaging service but also using operating systems that are non-Google, Apple, Microsoft or Amazon.

This is also one of the big reasons why getting our friends and family OFF these BigTech controlled operating systems is so important!

Note: Is this a PERFECT method of preventing nefarious individuals or organizations from tracking and finding you?  Of course not.  As mentioned above, with enough means and motive someone desperate enough to spend the time and money will likely be able to do so if you are transacting online.

Your goal is to make the burden of trying to track and monitor your every move high enough that you are simply “not worth it” for them to go through the lengths to track you and covertly access your communications when there are Billions of people who are still freely and willingly giving them their information.

anon hacker

The “… but the hardware itself can track and spy on you” Argument

It is definitely the case that some hardware manufacturers, such as Intel and Nvidia (which are in many laptop and desktop computers), provide “backdoor” access to their chips for our intelligence agencies.

This is a byproduct of the “for national security reasons” argument that Google, Apple, Microsoft and Amazon also use when they provide the same access to these agencies.

We know that hardware from China, such as Huawei, most definitely provides a feed of all activity on the devices back to the CCP.  We know that China has also secretly tried to embed components on motherboards to feed data back to the CCP.

The same goes for hardware/software developed in Israel, Russia or nearly every other country on the planet.  “For national security reasons” makes logical sense in all these cases… from their own national perspective.

Hence, how do we KNOW that the hardware in the Pixel devices or laptops we use do not, and are not, sending information back to Google, the CCP or any of our intelligence agencies?  We unfortunately can NOT say that this is 100% NOT happening.  It very well might be!

We CAN SAY; however, that through our continued testing and research, as well as that of the extended community of liberty minded geeks around the world, we have not found the Pixel devices we use, after stripping it of the Google Android operating system and installing GrapheneOS, as well as our list of vetted applications, to be making unwanted “calls” to Google or other entities without the approval and knowledge of the user.

This is also the case for the Pixel 6 and 7 devices using the Google Tensor chip, which we were initially concerned about when Tensor was released and why we did not offer the Pixel 6 or 7 devices until we felt we had done enough testing and research to confirm nothing nefarious was going on.

We have not done extensive research yet on the Pixel 8 or 9 devices, which is only part of the reason why we don’t offer them in our product catalog now.  The primary reason is because they are crazy expensive and only add nominal additional value above and beyond the 6 and 7 models.

It is also important to note that the information collected, and functionality enabled, through hardware level backdoor access is extremely limited.  Without accessing the operating system, very little useful consumer data can be compiled.

Again, we’re trying to make ourselves a hard and costly target to acquire here.  Gaining approvals to leverage sophisticated hacking tools by extremely hard to find hackers to try and leverage the backdoor access that might be embedded in firmware/hardware on a device takes a significant amount of resources.

If you’re Tucker Carlson or Vladimir Putin, sure, I’m betting the NSA would sign off on such actions in a heart beat.  If you’re a small business owner who simply doesn’t want BigTech spying on your every move who is part of the community of millions of Americans that speak openly about how much we love Christ, our country and our freedom… I hate to break it to you, but you’re not on this list.

That which might be compiled through this method is also extremely limited compared to what is being compiled by BigTech through their control of your operating system!

In Conclusion…

To be clear, we do NOT claim our Ghost Devices will prevent extremely sophisticated hackers and intelligence agencies from tracking you.

You could also, as a user of the device, give complete access to Facebook, for example, by downloading their app and giving the app permissions to everything of relevance on your device.

Point being, YOU provided the app access knowingly and willingly and you had a choice in the matter.  The device did what you told it to do vs. the device doing what it wants to do without your knowledge or consent.

Also worth noting is that the list above is far from conclusive.  I did not dive into the reality that the vast majority of viruses and related security hazards online are designed to run programs that simply can not operate in GrapheneOS or Linux based environments.

I did not dive into the nature of open source and how this allows users to verify if there is or is not nefarious code hiding in their device.

These both, however, add even more layers of privacy and security that simply do not exist within BigTech operating systems.

Our devices are designed to provide a baseline level of privacy and security that makes you and your device a far harder target.  Most importantly, it pulls you out of nearly all the data harvesting mechanisms Google, Apple, Microsoft and Amazon use by controlling your operating system.

We believe our Ghost devices are a HUGE step in the right direction and far better than simply throwing up our hands and saying, “Screw it! I’m not going to do anything because there’s still a chance they’ll be able to spy on me no matter what I do!”

Much like the realm of physical security, I can be a master martial artist with advanced weapons training and hiding in a bunker with armed guards outside… but if someone with enough means and motive needs to find and eliminate me they can and likely will.

Does this mean that I shouldn’t become aware of my situation, learn some basic self defense and try not to make my family, home and me an easy target when out in public?  Of course not!

I want to make it exponentially more difficult and costly for anyone trying to spy on me or do me harm to do so through the precautions I have taken, which will hopefully deter the vast majority of people who may want to find and eliminate me from undertaking the effort.

With this in mind, we do know for a fact that the cost and coordination required to try and spy on, and gain access to, one’s communications who are smart about using open source systems, encrypted communications and secure online search tools (VPN, browser, etc.) is exponentially more difficult than those who live in the iCloud and Google universe.

The “good guys” we know who formerly worked as black hat hackers or with various intelligence agencies have confirmed that the bureaucracy involved to authorize a complex communications “hack” on an individual is extensive and the cost to do so is over $1M per authorization.

As such, our primary objective is to provide you with a few tools and some training to prevent you from freely and willingly giving all your data and location information to BigTech, and by proxy, hackers and our own government agencies.  We are empowering you to learn about and regain control over some of the basic decisions about who and what should have access to your data so you don’t continue to exist as a sitting duck operating entirely within the control of the very organizations we despise.

Hackers, like most criminals, focus on easy targets.

Don’t be an easy target.

Hopefully this article was helpful. If you’d like to add any insights to my post here, or you feel I am missing something major, please do not hesitate to contact us at support@mark37.com!

Connect on Social Media

Shopping cart0
There are no products in the cart!
Continue shopping