Posts

LIVE Training Class Resources

Welcome to Your Digital Privacy Journey Roadmap

Thank you for joining our Ghost Phone Live class series. The Privacy Roadmap and content below are designed to help you navigate your personal journey toward digital privacy and security in a world increasingly hostile to both.

Why This Roadmap Matters:

Most people feel overwhelmed when starting their privacy journey. There are countless tools, techniques, and technologies to learn – but where do you begin? This document provides a structured approach that has helped hundreds of our students successfully break free from Big Tech surveillance.

How To Use The Roadmap Document:

Start by completing the Stage 1 audit to understand your current digital footprint. Then work through each stage at your own pace, checking off items as you complete them. Remember that privacy is not a destination but a journey – focus on progress, not perfection.

As we cover these topics in our weekly classes, you’ll gain the knowledge and confidence to implement each step. The roadmap below is yours to customize based on your personal threat model and needs.

You can view and print the Privacy Roadmap Document by clicking the link below:

Privacy Roadmap Needs Audit & Progress Tracker

Remember, the goal is to simplify your life and not further complicate things. If you’re feeling overwhelmed, take a step back and ask if the tools and applications you’re trying to understand and use are even necessary. Often, they are NOT!

Need Help?

Reach out in our Telegram group, hit us up on livechat if we are available or email us at support@mark37.com or during office hours.

You are not alone on this journey!

Intro Class (1-8-25)

*Video Replay

*Transcription

*Content Summary

  • Digital Privacy Journey Overview
    • Introduction to digital privacy roadmap development
    • Discussion of individual privacy journey stages
    • Importance of systematic approach to privacy transition
    • Growth trends in privacy-focused technology adoption
  • Getting Started Guidelines
    • Emphasis on creating personalized digital privacy roadmap
    • Importance of documenting current digital footprint
    • Step-by-step approach vs rushing into advanced techniques
    • Introduction to website resources and documentation
  • Migration Strategy
    • Framework for migrating from Google/Apple ecosystems
    • Planning considerations for data migration
    • Discussion of common migration challenges
    • Overview of upcoming migration tools and developments
  • Core Privacy Concepts
    • Explanation of realistic privacy expectations
    • Discussion of trade-offs between convenience and privacy
    • Understanding the difference between basic and advanced privacy measures
    • Practical approach to achieving meaningful privacy protection
  • Resource Navigation
    • Introduction to MARK37.com resources section
    • Overview of step-by-step guides
    • Access to tutorial videos and documentation
    • Importance of community support and learning resources
  • Communication Platforms Discussion
    • Overview of various encrypted communication tools
    • Introduction to Signal, Telegram, and Element
    • Discussion of pros and cons for different communication platforms
    • Plans for secure class communication channel
  • Support System
    • Introduction to course structure and support methods
    • Overview of homework expectations
    • Emphasis on documentation and planning
    • Introduction to community support channels

Class #2 (1-15-25)

*Video Replay

*Transcription

*Content Summary

  • GrapheneOS Device Management
    • Overview of “Stock” GrapheneOS device configuration
    • Explanation of default system apps and their removal restrictions
    • Comprehensive backup procedures for GrapheneOS devices
    • File transfer methods between phone and laptop
  • Device Privacy Features
    • Setup and configuration of Private Spaces (Pixel 6+ models)
      • Implementation process
      • Use cases
      • Security benefits
    • User Account Management
      • Creating separate user accounts
      • Comparative analysis of Private Spaces vs. separate user accounts
      • Best practices for each approach
  • Data Management & Migration
    • Contact management procedures
      • Bulk deletion methods
      • Re-uploading contacts efficiently
    • Text message management
      • Clearing message history
      • Restoring messages systematically
    • File transfer protocols between devices
  • Privacy & Security Best Practices
    • Browser-based access vs. app installation security comparison
    • Safe browsing practices
    • Risk assessment for different access methods
  • Research & Support Tools
    • Utilizing Brave’s Leo learning language model
      • Finding device-specific information
      • Troubleshooting common issues
      • General technology queries
  • Migration Planning
    • Review of recommended roadmap for privacy transition
    • Strategic planning for device setup
    • Progressive implementation guidelines

Class #3 (1-22-25)

*Video Replay

*Transcript

*Content Summary

  • Contact & Calendar Syncing
    • Detailed walkthrough of setting up Nextcloud for contact and calendar synchronization
    • Integration between Nextcloud and email services (Paxmail/Liberation Tech)
    • Process for syncing contacts and calendars across devices
    • Explanation of Nextcloud server requirements and functionality
  • Email Client Setup
    • Installation and configuration of Thunderbird mobile email client
    • Detailed steps for setting up email accounts with proper server settings
    • Comparison between Thunderbird and other email clients
    • Discussion of benefits of using email clients vs. web interfaces
  • Navigation Apps
    • Comprehensive overview of MagicEarth navigation app
    • Settings configuration
    • Navigation features
    • Troubleshooting location services
  • Introduction to alternative navigation apps:
    • OSMAND
    • Offline Maps (for backpacking)
    • Comparison of features and use cases for different navigation options
  • Privacy & Security Tips
    • Battery optimization using dark theme
    • Safe app installation practices and evaluation
    • Guidelines for checking app permissions and data collection
    • Private browsing techniques
    • Discussion of device support and security updates (Pixel phone models)
  • Communication Platform
    • Introduction to Element as the new class communication platform
    • Overview of the private Matrix server setup
    • Instructions for installation and upcoming access details
  • Additional Resources
    • Documentation and guides available on Paxmail.cc
    • Recommendations for researching and finding privacy-focused apps
    • Alternative methods for accessing video content privately

Class #4 (2-5-25)

*Video Replay

*Transcript

*Content Summary

  • How Telecom Works
    • Detailed explanation of how phone calls and text messages are routed
    • Overview of cellular networks and tower infrastructure
    • Description of domain name servers and how they track phone locations
    • Explanation of carrier peering relationships and infrastructure sharing
    • Discussion of how messaging services (iMessage, Google Messages) differ from standard SMS
  • Mobile Network Operators
    • Overview of the “Big Three” carriers (AT&T, T-Mobile, Verizon)
    • Explanation of MVNOs (Mobile Virtual Network Operators) and resellers
    • Discussion of which providers protect customer data (Pure Talk, Patriot Mobile, iFani)
    • Information about SIM cards and iPhone-specific considerations when switching providers
  • VPNs (Virtual Private Networks)
    • Detailed explanation of how VPNs work
    • Discussion of when to use (and not use) VPNs
    • Common issues with VPNs (printer connectivity, website access)
    • Importance of VPN provider trustworthiness
    • Recommended VPN providers (Mullvad, Brave)
  • EMF and 5G Technology
    • Explanation of different types of 5G technology
    • Clarification on “5G nationwide” vs “5G ultra wideband”
    • Discussion of radiation concerns and health implications
    • Information about SAR values and radiation levels from smartphones
    • Resources for EMF protection and measurement
  • VoIP (Voice over IP) Services
    • Overview of VoIP phone numbers as alternatives to traditional carriers
    • How to use VoIP with data-only plans
    • Options for anonymous communication
    • Discussion of VoIP providers and services
  • Additional Resources Mentioned
    • Email migration guides and tutorials
    • Links to PaxMail setup instructions
    • Information about Thunderbird replacing K9 Mail
    • References to additional articles and resources on the website
  • Key Takeaways
    • Understanding telecom infrastructure helps comprehend how privacy measures work
    • Start with basics before advancing to more complex privacy measures
    • Consider your specific needs when implementing privacy solutions
    • Balance convenience with privacy/security needs
    • Stay informed about emerging technologies and their implications

Class #5 (2-12-25)

*Video Replay

*Transcript

*Content Summary

  • Understanding AI and Language Learning Models (LLMs)

    • Defined AI as a simulation of human intelligence by machines – essentially a tool that can be used for both beneficial and harmful purposes
    • Explained current real-world AI applications:
      • Autonomous robots and drones
      • Chatbots and virtual assistants
      • Image/video analysis and generation
      • Machine learning for equipment maintenance
      • Pattern recognition and automation

    AI Tools Demonstrated

    • Claude.ai – Personal AI assistant with private instance capabilities
      • Used for analyzing documents, bills, and complex information
      • Maintains user privacy by not sharing data across instances
    • Brave Leo – Built-in AI tool in Brave browser
      • Useful for quick research and information synthesis
      • Can help troubleshoot technical issues
    • ChatGPT – Demonstrated capabilities including:
      • Text generation and analysis
      • Image generation and recognition
      • Web content summarization

    Practical Applications Discussed

    • Document Analysis: Demonstrated how AI can quickly analyze and summarize complex documents (e.g., legal bills, technical documentation)
    • Image Recognition: Showed how AI can identify locations and analyze images without metadata
    • Technical Support: Using AI tools to find solutions for device-related issues
    • Content Creation: How AI can assist in writing and editing while maintaining authenticity

    Internet Security While Traveling

    • Strong recommendation against connecting to public WiFi networks (hotels, coffee shops, airports)
    • Safer alternatives presented:
      • Using phone as a personal hotspot
      • GL.iNet travel routers with built-in VPN support
      • Importance of VPN usage when accessing public networks

    Key Takeaways

    • AI tools should be viewed as productivity enhancers rather than replacements
    • Importance of proper prompting and verification of AI-generated content
    • Balance between leveraging technology and maintaining privacy/security
    • Need for careful evaluation of which tools to trust based on their privacy policies and company backgrounds

    Additional Resources Mentioned

    • GL.iNet travel routers (gl-inet.com)
    • Claude.ai free version
    • Brave browser’s Leo AI feature
    • LM Studio for personal AI implementation

    The next class will continue exploring additional topics based on student interests and questions. Students are encouraged to submit topics they’d like to see covered in future sessions.

Class #6 (2-19-25)

*Video Replay

*Transcript

*Content Summary

App Stores

  • Detailed walk through of F-Droid and Aurora Store
  • How to evaluate app safety (permissions, update frequency, developer reputation)
  • Using GitHub to research open-source applications
  • Methods for downloading apps directly from websites
  • Proper app update and management practices

Text Messaging

  • Differences between traditional SMS and proprietary messaging services (iMessage)
  • Explanation of carrier limitations on multimedia messaging
  • Alternative messaging apps (Signal, Telegram, Session)
  • Understanding why large files/videos can’t be sent via standard SMS

Printing & Scanning

  • Tips for connecting to printers via manufacturer apps
  • Using your phone camera as a scanner alternative
  • Simplifying document scanning with your phone’s camera

Additional Topics

  • App sandboxing techniques for privacy protection
  • Setting up private spaces and separate user accounts
  • New affiliate program announcement

Class #7 (3-5-25)

*Video Replay

*Transcript

*Content Summary

“How Ghost Can I Really Get?”

This class explored the reality of digital privacy in today’s surveillance environment, with a practical focus on what’s achievable versus what’s theoretical.

Key topics covered:

Digital Privacy Fundamentals

  • Privacy as a spectrum rather than binary state
  • The “layers of privacy” concept (hardware, firmware, OS, applications, communications)
  • Making yourself “expensive to track” rather than impossible to track

Hardware & Firmware Realities

  • Explanation of why Pixel phones are used despite being Google hardware
  • Debunking myths about refurbished devices
  • Detailed breakdown of what Coreboot/PureBoot is and why it’s not essential for most users
  • Cost-benefit analysis of hardware security investments

Practical Privacy Implementation

  • The 90/10 rule: how changing your OS and browser solves 90%+ of privacy issues
  • App permissions management and minimizing installed applications
  • Carrier tracking mitigation through MVNOs and VoIP numbers
  • The limitations of encrypted messaging (Signal, Session) when contacts use insecure devices

Threat Modeling

  • How to assess your personal privacy needs based on realistic threats
  • Different privacy approaches for average users vs. high-value targets
  • Balancing convenience, cost, and security
  • Why most people don’t need to invest in expensive privacy solutions

Communicating Privacy to Others

  • Addressing common objections (“I have nothing to hide”)
  • Using effective analogies that connect (digital privacy as home security)
  • Progressive introduction of privacy concepts rather than overwhelming people
  • Meeting people where they are technologically

The class emphasized that meaningful privacy is achievable without extreme measures, focusing on high-impact changes first (OS, browser, apps) before considering advanced protection like Coreboot. It concluded with strategies for building sustainable privacy habits and helping friends and family understand the importance of digital privacy.

Class #8 (3-12-25)

*Video Replay

*Transcript

*Content Summary

“Secure Communications”

This session focused on secure communications technologies, explaining how various systems work and their privacy implications. Here’s a breakdown of the key topics covered:

Satellite Communications (Satcoms)

  • Clarified common misconceptions about satellite phones and services like Starlink
  • Explained that Starlink for iPhone will connect to T-Mobile towers first, not directly to satellites
  • Traditional satellite phones connect to satellites but must route through ground stations for two reasons:
    • To access DNS servers for routing information
    • For legally mandated monitoring by federal agencies
  • Satphones are useful for remote areas but may not work in grid-down scenarios as satellites could be targeted

Encrypted Messaging Apps

  • Signal: Uses end-to-end encryption where the encryption keys exist only on users’ devices
    • Signal servers cannot see message content, only metadata
    • When adding a new device, messages don’t automatically transfer because of device-specific encryption
    • Signal doesn’t police content since they can’t access it
  • Telegram: Different from Signal because Telegram servers can access messages
    • Allows for content monitoring to comply with regulations
    • Less private than Signal but easier to use
  • Session: Similar to Signal but uses a decentralized network of nodes
    • Messages are relayed through multiple nodes that delete information after transmission
    • Doesn’t require phone number or email for signup
    • Uses randomly generated public keys for identification
    • More complex to set up than Signal or Telegram
  • Matrix/Element: Open-source framework for encrypted communications
    • Can be self-hosted on your own server
    • We had set up a server to host our community chat but found it too complicated for general

Offline Communications

  • SCIF environments: Secure facilities that block all signals
    • Used by government/defense for secure conversations
    • Alternative is going “off-grid” for sensitive discussions
  • Mesh Networks: Decentralized communication systems
    • Demonstrated LilyGo devices ($70-90) that create local encrypted mesh networks
    • Range of 1-3 miles per node
    • Nodes act as repeaters, allowing extended coverage across communities
    • Can use Meshtastic app with these devices
    • Alternative system from Chatters.io offers dedicated devices without needing phones but they cost much more than the LilyGo options

Other Topics

  • Light Phone was discussed as a potential “dumb phone” alternative but the capital behind the business and focus on “carbon neutrality” raises red flags
  • Mentioned challenges finding truly de-Googled simple phones
  • Referenced a detailed article about Apple’s privacy issues
  • Encouraged community participation in Telegram group

The presentation emphasized understanding how these technologies actually work versus marketing claims, and focused on practical applications for privacy-conscious users.

 

Connect on Social Media

Shopping cart0
There are no products in the cart!
Continue shopping